Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Web Usage............................................................................................................................................................... 4
Top Allowed Websites...................................................................................................................................................... 4
Top Websites by Bandwidth............................................................................................................................................. 4
Top Blocked Websites...................................................................................................................................................... 4
Top Users by Blocked Requests....................................................................................................................................... 4
Top Users by Requests.................................................................................................................................................... 4
Top Users by Bandwidth................................................................................................................................................... 4
Top Video Streaming Web Sites by Bandwidth................................................................................................................ 5
Emails....................................................................................................................................................................... 6
Top Senders by Number of Emails................................................................................................................................... 6
Top Senders by Combined Email Size............................................................................................................................. 6
Top Recipients by Number of Emails................................................................................................................................ 6
Top Recipients by Combined Email Size.......................................................................................................................... 6
Threats...................................................................................................................................................................... 7
Malware Detected............................................................................................................................................................. 7
Malware Victims................................................................................................................................................................ 7
Malware Sources.............................................................................................................................................................. 7
Malware History................................................................................................................................................................ 7
Botnet Detected................................................................................................................................................................ 7
Botnet Victims................................................................................................................................................................... 7
Botnet C&C....................................................................................................................................................................... 8
Botnet History................................................................................................................................................................... 8
Intrusions Detected........................................................................................................................................................... 8
Intrusion Victims................................................................................................................................................................ 8
Intrusion Sources.............................................................................................................................................................. 8
Intrusions Blocked............................................................................................................................................................. 8
Intrusions By Severity....................................................................................................................................................... 9
Intrusion History................................................................................................................................................................ 9
0
900
1800
2700
3600
4500
5400
6300
7200
8100
9000
00
0K
200K
400K
600K
800K
1000K
1200K
1400K
1600K
1800K
2000K
Bandwidth
:0 00
0 :0
0
01
:0 01
0 :0
0
Number of Sessions
02
:0 02
0 :0
0
03
:0 03
0 :0
0
04
:0 04
0 :0
0
05
:0 05
0 :0
0
06 06
:0
0
Bandwidth and Applications
:0
0
07 07
:0
0 :0
0
0 0
22 22
:0 :0
0 0
23 23
Traffic In
:0 :0
0 0
Page 1 of 11
Traffic Statistics
Summary Stats
Total Sessions 21.1 K
Total Bytes In: 724.5 MB Out: 546.4 MB
Average Sessions Per Hour 878
Average Bytes Per Hour In: 30.2 MB Out: 22.8 MB
Most Active Hour By Sessions 2019-06-14 21:00
Total Users 45
Total Applications 62
Total Destinations 390
27
24
21
Active Users
18
15
12
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Top Destinations by Bandwidth
Hostname (or IP) Traffic Out Traffic In Sessions
cbn.net.id 463.4 MB 41
ooklaserver.net 444.9 MB 86
gvt1.com 176.4 MB 16
fg5h1e5819901262 48.8 MB 7.4 K
pertamina.com 26.2 MB 489
cdninstagram.com 22.9 MB 48
detik.net.id 14.7 MB 91
adcolony.com 12.8 MB 12
google.com 4.4 MB 821
anynet relay 4.3 MB 1.3 K
Malware Victims
# Victim Occurrence
No matching log data for this report
Malware Sources
# Malware Source Host Name Counts
No matching log data for this report
Malware History
10
6
# of Viruses
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
Botnet Detected 23
Botnet Victims
# Victim Name Counts
No matching log data for this report
Botnet History
10
6
# of Botnet
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Intrusions Detected
# Intrusion Name Counts
1 unknown 12
Intrusion Victims
# Intrusion Victim Counts
1 54.192.151.41 11
2 54.192.151.68 1
Intrusion Sources
# Intrusion Source Counts
1 10.3.84.98 12
Intrusions Blocked
# Intrusion Name Counts
No matching log data for this report
% Severity Occurrence
100.0% info 12
Intrusion History
20
18
16
14
# of Intrusions
12
10
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
System Events
# Event Name (Description) Severity Counts
1 Configuration changed 6
7 Device rebooted 2
8 Device shutdown 2
13 Authentication error 1