All Alerts
All Alerts
BGP Instability
Too many BGP updates (max. per 5 min.): Jul 19 22:55 - 22:55 (Less than 1
195832 Medium None
Router:rMPLSPolo1BR02 minute)
Updates:5794
BGP Instability
Too many BGP updates (max. per 5 min.):
195831 Medium Jul 19 22:45 - 22:55 (0:10) None
Router:rMPLSVillaSalvadorBR01
Updates:8970
page 1 of 6
DoS Host Alert Possible Attack
High Incoming Host Alert to 181.188.165.38 The "DNS Amplification" host alert signature has been
195828 716.0% of 10 Kpps using Nuevatel_IPv4 Jul 19 22:33 - 22:50 (0:17) triggered at router "rMPLSPolo1BR02". (expected rate:
1.2 Gbps, 112.3 Kpps Misuse Types: 200.00 Mbps/30.00 Kpps, observed rate: 210.02 Mbps/
IP Fragmentation, UDP, DNS Amplification, CLDAP Amplification 18.04 Kpps) (by auto-annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 103.95.221.8 The "IP Fragmentation" host alert signature has been
195827 42.0% of 10 Kpps using Teliasonera Jul 19 22:25 - 22:37 (0:12) triggered at router "rMPLSPolo1BR02". (expected rate:
42.5 Mbps, 4.2 Kpps Misuse Types: 2.50 Kpps, observed rate: 4.18 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195826 46.0% of 10 Kpps using Teliasonera Jul 19 22:24 - 22:38 (0:14)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
2.2 Mbps, 4.6 Kpps Misuse Types:
observed rate: 2.57 Kpps) (by auto-annotation)
TCP SYN, TCP RST
Possible Attack
DoS Host Alert The "IP Fragmentation" host alert signature severity rate
High Incoming Host Alert to 190.113.215.99 configured for "MOVIL_CGN_Arequipa" has been
195825 498.0% of 10 Kpps using MOVIL_CGN_Arequipa Jul 19 22:13 - 22:22 (0:09) exceeded for 3 minutes, changing Severity Level from
895.0 Mbps, 86.0 Kpps Misuse Types: medium to high (expected rate: 10.00 Kpps, observed
IP Fragmentation, UDP rate: 47.38 Kpps) (boundary: managed object) (by auto-
annotation)
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
High Outgoing Host Alert from 190.113.215.99
configured for "Tata" has been exceeded for 3 minutes,
195824 482.0% of 10 Kpps using Tata Jul 19 22:13 - 22:22 (0:09)
changing Severity Level from medium to high (expected
837.6 Mbps, 80.3 Kpps Misuse Types:
rate: 10.00 Kpps, observed rate: 43.65 Kpps) (by auto-
IP Fragmentation, UDP
annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 5.81.80.140 The "IP Fragmentation" host alert signature has been
195823 31.0% of 10 Kpps using Teliasonera Jul 19 22:10 - 22:16 (0:06) triggered at router "rMPLSPolo1BR02". (expected rate:
30.6 Mbps, 3.1 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.12 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 176.160.42.152 The "IP Fragmentation" host alert signature has been
195822 37.0% of 10 Kpps using Teliasonera Jul 19 22:09 - 22:20 (0:11) triggered at router "rMPLSPolo1BR02". (expected rate:
37.0 Mbps, 3.7 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.02 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 8.8.8.8
The "ICMP" host alert signature has been triggered at
195821 43.0% of 30 Kpps using Google Jul 19 22:02 - Ongoing (1:59)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
8.6 Mbps, 12.9 Kpps Misuse Types:
observed rate: 2.52 Kpps) (by auto-annotation)
ICMP, DNS
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195820 43.0% of 10 Kpps using Teliasonera Jul 19 21:58 - 22:03 (0:05)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
1.3 Mbps, 2.7 Kpps Misuse Types:
observed rate: 2.72 Kpps) (by auto-annotation)
TCP RST
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
Medium Incoming Host Alert to 179.58.73.238
configured for "Nuevatel_IPv4" has been exceeded,
195819 117.0% of 10 Kpps using Nuevatel_IPv4 Jul 19 21:56 - 22:01 (0:05)
changing Severity Level from low to medium (expected
117.9 Mbps, 11.7 Kpps Misuse Types:
rate: 10.00 Kpps, observed rate: 11.73 Kpps) (by auto-
IP Fragmentation
annotation)
DoS Host Alert Possible Attack
Low Incoming Host Alert to 190.107.60.33 The "IP Fragmentation" host alert signature has been
195818 47.0% of 10 Kpps using Nuevatel_IPv4 Jul 19 21:56 - 22:02 (0:06) triggered at router "rMPLSVillaSalvadorBR01". (expected
26.8 Mbps, 3.0 Kpps Misuse Types: rate: 2.50 Kpps, observed rate: 2.97 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 190.107.60.33 The "IP Fragmentation" host alert signature has been
195817 29.0% of 10 Kpps using Gtt Jul 19 21:56 - 22:02 (0:06) triggered at router "rMPLSPolo1BR02". (expected rate:
25.8 Mbps, 2.9 Kpps Misuse Types: 2.50 Kpps, observed rate: 2.87 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 176.160.42.152 The "IP Fragmentation" host alert signature has been
195816 40.0% of 10 Kpps using Teliasonera Jul 19 21:56 - 22:07 (0:11) triggered at router "rMPLSPolo1BR02". (expected rate:
39.4 Mbps, 4.0 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.02 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195815 34.0% of 10 Kpps using Teliasonera Jul 19 21:51 - 21:56 (0:05)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
1.2 Mbps, 2.5 Kpps Misuse Types:
observed rate: 2.52 Kpps) (by auto-annotation)
TCP RST
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195814 43.0% of 10 Kpps using Teliasonera Jul 19 21:45 - 21:50 (0:05)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
1.5 Mbps, 2.5 Kpps Misuse Types:
Kpps, observed rate: 2.52 Kpps) (by auto-annotation)
TCP SYN
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 176.160.42.152 The "IP Fragmentation" host alert signature has been
195813 44.0% of 10 Kpps using Teliasonera Jul 19 21:43 - 21:53 (0:10) triggered at router "rMPLSPolo1BR02". (expected rate:
45.1 Mbps, 4.4 Kpps Misuse Types: 2.50 Kpps, observed rate: 4.43 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 8.8.8.8
The "DNS" host alert signature has been triggered at
195812 35.0% of 30 Kpps using Google Jul 19 21:42 - 21:55 (0:13)
router "rMPLSPolo1BR02". (expected rate: 10.00 Kpps,
7.1 Mbps, 10.5 Kpps Misuse Types:
observed rate: 10.24 Kpps) (by auto-annotation)
ICMP, DNS
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
High Incoming Host Alert to 179.6.213.175
configured for "HFC CGN Polo1 - Huawei" has been
195811 541.0% of 10 Kpps using HFC CGN Polo1 - Huawei Jul 19 21:31 - 21:39 (0:08)
exceeded for 3 minutes, changing Severity Level from
911.4 Mbps, 89.6 Kpps Misuse Types:
medium to high (expected rate: 10.00 Kpps, observed
IP Fragmentation, UDP, DNS Amplification
rate: 44.16 Kpps) (by auto-annotation)
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
Medium Incoming Host Alert to 179.6.204.146
configured for "HFC CGN VES - Huawei" has been
195810 394.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 21:29 - 21:34 (0:05)
exceeded, changing Severity Level from low to medium
643.1 Mbps, 62.7 Kpps Misuse Types:
(expected rate: 10.00 Kpps, observed rate: 39.36 Kpps)
IP Fragmentation, UDP
(by auto-annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195809 46.0% of 10 Kpps using Teliasonera Jul 19 21:29 - 21:36 (0:07)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
2.7 Mbps, 4.6 Kpps Misuse Types:
Kpps, observed rate: 2.67 Kpps) (by auto-annotation)
TCP SYN, TCP RST
page 2 of 6
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 86.3.138.23 The "IP Fragmentation" host alert signature has been
195808 33.0% of 10 Kpps using Teliasonera Jul 19 21:25 - 21:32 (0:07) triggered at router "rMPLSPolo1BR02". (expected rate:
33.1 Mbps, 3.3 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.27 Kpps) (by auto-
IP Fragmentation annotation)
Interface Usage
High usage for:
195807 Medium Interface: Eth-Trunk23 Jul 19 21:15 - Ongoing (2:46) None
Router: rMPLSPolo1BR02
44.85 Gbps (112.1% of 40.00 Gbps)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 8.8.8.8
The "ICMP" host alert signature has been triggered at
195806 39.0% of 30 Kpps using Google Jul 19 21:12 - 21:38 (0:26)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
7.7 Mbps, 11.6 Kpps Misuse Types:
observed rate: 2.77 Kpps) (by auto-annotation)
ICMP, DNS
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 8.8.8.8
The "DNS" host alert signature has been triggered at
195805 35.0% of 30 Kpps using Google Jul 19 21:00 - 21:09 (0:09)
router "rMPLSPolo1BR02". (expected rate: 10.00 Kpps,
7.1 Mbps, 10.6 Kpps Misuse Types:
observed rate: 10.18 Kpps) (by auto-annotation)
ICMP, DNS
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 103.95.221.8 The "IP Fragmentation" host alert signature has been
195804 33.0% of 10 Kpps using Teliasonera Jul 19 20:59 - 21:04 (0:05) triggered at router "rMPLSPolo1BR02". (expected rate:
33.7 Mbps, 3.3 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.33 Kpps) (by auto-
IP Fragmentation annotation)
BGP Instability
Too many BGP updates (max. per 5 min.): Jul 19 20:55 - 20:55 (Less than 1
195803 Medium None
Router:rMPLSPolo1BR02 minute)
Updates:5518
BGP Instability
Too many BGP updates (max. per 5 min.): Jul 19 20:55 - 20:55 (Less than 1
195802 Medium None
Router:rMPLSVillaSalvadorBR01 minute)
Updates:5172
page 3 of 6
DoS Host Alert Possible Attack
Low Incoming Host Alert to 179.6.197.10 The "IP Fragmentation" host alert signature has been
195788 80.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 19:32 - 19:37 (0:05) triggered at router "rMPLSVillaSalvadorBR01". (expected
76.9 Mbps, 8.0 Kpps Misuse Types: rate: 2.50 Kpps, observed rate: 7.95 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195787 54.0% of 10 Kpps using Teliasonera Jul 19 19:29 - 19:57 (0:28)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
3.2 Mbps, 5.4 Kpps Misuse Types:
Kpps, observed rate: 2.62 Kpps) (by auto-annotation)
TCP SYN, TCP RST
Possible Attack
DoS Host Alert
The "TCP SYN" host alert signature severity rate
Medium Outgoing Host Alert from 43.227.216.14
configured for "Teliasonera" has been exceeded,
195786 101.0% of 10 Kpps using Teliasonera Jul 19 19:20 - 19:25 (0:05)
changing Severity Level from low to medium (expected
4.8 Mbps, 10.1 Kpps Misuse Types:
rate: 10.00 Kpps, observed rate: 10.07 Kpps) (by auto-
TCP SYN
annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195785 47.0% of 10 Kpps using Teliasonera Jul 19 19:17 - 19:26 (0:09)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
1.9 Mbps, 4.1 Kpps Misuse Types:
observed rate: 2.62 Kpps) (by auto-annotation)
TCP RST
DoS Host Alert Possible Attack
High Incoming Host Alert to 179.6.215.115 The "NTP Amplification" host alert signature has been
195784 178.0% of 100 Kpps using HFC CGN Polo1 - Huawei Jul 19 19:15 - 19:32 (0:17) triggered at router "rMPLSPolo1BR02". (expected rate:
664.3 Mbps, 177.6 Kpps Misuse Types: 200.00 Mbps/100.00 Kpps, observed rate: 295.24 Mbps/
IP Fragmentation, UDP, NTP Amplification 78.81 Kpps) (by auto-annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195783 45.0% of 10 Kpps using Teliasonera Jul 19 19:09 - 19:15 (0:06)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
1.2 Mbps, 2.7 Kpps Misuse Types:
observed rate: 2.52 Kpps) (by auto-annotation)
TCP RST
Possible Attack
DoS Host Alert The "IP Fragmentation" host alert signature severity rate
High Incoming Host Alert to 179.6.197.10 configured for "HFC CGN VES - Huawei" has been
195782 455.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 19:09 - 19:18 (0:09) exceeded for 3 minutes, changing Severity Level from
776.0 Mbps, 73.4 Kpps Misuse Types: medium to high (expected rate: 10.00 Kpps, observed
IP Fragmentation, UDP, DNS Amplification rate: 45.48 Kpps) (boundary: managed object) (by auto-
annotation)
Possible Attack
DoS Host Alert
This alert was generated due to fast flood detection. The
High Fast Flood Outgoing Host Alert from 200.108.110.126
"TCP ACK" host alert signature has been triggered at
195781 197.0% of 80 Mbps using Firewall_CLARO Jul 19 18:59 - 19:06 (0:07)
router "rMPLSPolo1BR02". (expected rate: 50.00 Mbps/
157.5 Mbps, 14.4 Kpps Misuse Types:
15.00 Kpps, observed rate: 80.19 Mbps/7.55 Kpps) (by
TCP ACK
auto-annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.44.76.150 The "IP Fragmentation" host alert signature has been
195780 89.0% of 10 Kpps using Teliasonera Jul 19 18:53 - 19:02 (0:09) triggered at router "rMPLSPolo1BR02". (expected rate:
89.0 Mbps, 8.9 Kpps Misuse Types: 2.50 Kpps, observed rate: 5.44 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195779 44.0% of 10 Kpps using Teliasonera Jul 19 18:51 - 18:57 (0:06)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
1.5 Mbps, 2.9 Kpps Misuse Types:
Kpps, observed rate: 2.62 Kpps) (by auto-annotation)
TCP SYN, TCP RST
DoS Host Alert Possible Attack
Low Incoming Host Alert to 181.177.190.215 The "IP Fragmentation" host alert signature has been
195778 34.0% of 10 Kpps using Nuevatel_IPv4 Jul 19 18:48 - 18:53 (0:05) triggered at router "rMPLSVillaSalvadorBR01". (expected
1.6 Mbps, 3.4 Kpps Misuse Types: rate: 2.50 Kpps, observed rate: 3.37 Kpps) (by auto-
IP Fragmentation annotation)
Possible Attack
DoS Host Alert The "IP Fragmentation" host alert signature severity rate
High Incoming Host Alert to 179.6.197.10 configured for "HFC CGN VES - Huawei" has been
195777 661.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 18:46 - 19:07 (0:21) exceeded for 3 minutes, changing Severity Level from
1.1 Gbps, 106.9 Kpps Misuse Types: medium to high (expected rate: 10.00 Kpps, observed
IP Fragmentation, UDP, DNS Amplification rate: 49.87 Kpps) (boundary: managed object) (by auto-
annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 128.116.112.44
The "TCP RST" host alert signature has been triggered at
195776 63.0% of 10 Kpps using Teliasonera Jul 19 18:40 - Ongoing (5:21)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
3.7 Mbps, 6.3 Kpps Misuse Types:
observed rate: 2.52 Kpps) (by auto-annotation)
TCP SYN, TCP RST
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.44.76.150 The "IP Fragmentation" host alert signature has been
195775 60.0% of 10 Kpps using Teliasonera Jul 19 18:38 - 18:46 (0:08) triggered at router "rMPLSPolo1BR02". (expected rate:
62.5 Mbps, 6.0 Kpps Misuse Types: 2.50 Kpps, observed rate: 5.94 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195774 54.0% of 10 Kpps using Teliasonera Jul 19 18:38 - 18:49 (0:11)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
3.2 Mbps, 5.4 Kpps Misuse Types:
Kpps, observed rate: 2.72 Kpps) (by auto-annotation)
TCP SYN, TCP RST
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
High Incoming Host Alert to 179.7.192.204
configured for "HFC_CGN_Trujillo" has been exceeded
195773 494.0% of 10 Kpps using HFC_CGN_Trujillo Jul 19 18:32 - 18:41 (0:09)
for 3 minutes, changing Severity Level from medium to
854.7 Mbps, 81.5 Kpps Misuse Types:
high (expected rate: 10.00 Kpps, observed rate: 49.37
IP Fragmentation, UDP, DNS Amplification
Kpps) (by auto-annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 120.27.11.62 The "IP Fragmentation" host alert signature has been
195772 28.0% of 10 Kpps using Teliasonera Jul 19 18:23 - 18:28 (0:05) triggered at router "rMPLSPolo1BR02". (expected rate:
33.3 Mbps, 2.8 Kpps Misuse Types: 2.50 Kpps, observed rate: 2.82 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.44.76.150 The "IP Fragmentation" host alert signature has been
195771 61.0% of 10 Kpps using Teliasonera Jul 19 18:18 - 18:27 (0:09) triggered at router "rMPLSPolo1BR02". (expected rate:
61.4 Mbps, 6.1 Kpps Misuse Types: 2.50 Kpps, observed rate: 5.09 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195770 45.0% of 10 Kpps using Teliasonera Jul 19 18:12 - 18:20 (0:08)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
2.2 Mbps, 3.8 Kpps Misuse Types:
observed rate: 2.67 Kpps) (by auto-annotation)
TCP SYN, TCP RST
page 4 of 6
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
Medium Incoming Host Alert to 179.6.207.211
configured for "HFC CGN VES - Huawei" has been
195769 433.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 18:05 - 18:11 (0:06)
exceeded, changing Severity Level from low to medium
748.4 Mbps, 71.9 Kpps Misuse Types:
(expected rate: 10.00 Kpps, observed rate: 43.28 Kpps)
IP Fragmentation, UDP, DNS Amplification
(by auto-annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 31.42.184.142 The "IP Fragmentation" host alert signature has been
195768 46.0% of 10 Kpps using Teliasonera Jul 19 18:03 - 18:31 (0:28) triggered at router "rMPLSPolo1BR02". (expected rate:
47.3 Mbps, 4.6 Kpps Misuse Types: 2.50 Kpps, observed rate: 2.87 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.23.214.74 The "IP Fragmentation" host alert signature has been
195767 61.0% of 10 Kpps using Teliasonera Jul 19 17:54 - 18:33 (0:39) triggered at router "rMPLSPolo1BR02". (expected rate:
60.5 Mbps, 6.1 Kpps Misuse Types: 2.50 Kpps, observed rate: 6.14 Kpps) (by auto-
IP Fragmentation annotation)
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
Medium Incoming Host Alert to 179.7.193.207
configured for "HFC_CGN_Trujillo" has been exceeded,
195766 374.0% of 10 Kpps using HFC_CGN_Trujillo Jul 19 17:53 - 17:59 (0:06)
changing Severity Level from low to medium (expected
660.4 Mbps, 65.3 Kpps Misuse Types:
rate: 10.00 Kpps, observed rate: 37.44 Kpps) (by auto-
IP Fragmentation, UDP, CLDAP Amplification
annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 128.116.112.44
The "TCP SYN" host alert signature has been triggered at
195765 49.0% of 10 Kpps using Teliasonera Jul 19 17:40 - 18:35 (0:55)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
3.0 Mbps, 4.9 Kpps Misuse Types:
observed rate: 2.77 Kpps) (by auto-annotation)
TCP SYN, TCP RST
DoS Host Alert
Possible Attack
Low Incoming Host Alert to 179.6.34.199
The "UDP" host alert signature has been triggered at
195764 54.0% of 100 Kpps using HFC_CGN_CUZCO_1 Jul 19 17:37 - 17:42 (0:05)
router "rMPLSPolo1BR02". (expected rate: 50.00 Kpps,
522.4 Mbps, 54.4 Kpps Misuse Types:
observed rate: 54.42 Kpps) (by auto-annotation)
UDP
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 128.116.112.44
The "TCP SYN" host alert signature has been triggered at
195763 35.0% of 10 Kpps using Teliasonera Jul 19 17:27 - 17:35 (0:08)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
1.9 Mbps, 3.5 Kpps Misuse Types:
observed rate: 2.77 Kpps) (by auto-annotation)
TCP SYN
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 163.172.6.135 The "IP Fragmentation" host alert signature has been
195762 38.0% of 10 Kpps using Level3 Jul 19 17:27 - 17:34 (0:07) triggered at router "rMPLSPolo1BR02". (expected rate:
38.3 Mbps, 3.8 Kpps Misuse Types: 2.50 Kpps, observed rate: 2.62 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195761 50.0% of 10 Kpps using Teliasonera Jul 19 17:05 - 17:29 (0:24)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
3.0 Mbps, 5.0 Kpps Misuse Types:
observed rate: 2.52 Kpps) (by auto-annotation)
TCP SYN, TCP RST
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP SYN" host alert signature has been triggered at
195760 48.0% of 10 Kpps using Teliasonera Jul 19 16:56 - 17:03 (0:07)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
2.6 Mbps, 4.3 Kpps Misuse Types:
observed rate: 2.72 Kpps) (by auto-annotation)
TCP SYN, TCP RST
DoS Host Alert
Possible Attack
Low Incoming Host Alert to 190.117.164.165
The "UDP" host alert signature has been triggered at
195759 72.0% of 100 Kpps using HFC Pyme - IPv4 Jul 19 16:55 - 17:00 (0:05)
router "rMPLSVillaSalvadorBR01". (expected rate: 50.00
844.6 Mbps, 71.7 Kpps Misuse Types:
Kpps, observed rate: 71.67 Kpps) (by auto-annotation)
UDP
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 38.143.11.180 The "IP Fragmentation" host alert signature has been
195758 33.0% of 10 Kpps using Teliasonera Jul 19 16:55 - 17:00 (0:05) triggered at router "rMPLSVillaSalvadorBR01". (expected
33.8 Mbps, 3.3 Kpps Misuse Types: rate: 2.50 Kpps, observed rate: 3.32 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 45.131.184.73
The "TCP SYN" host alert signature has been triggered at
195757 71.0% of 10 Kpps using Teliasonera Jul 19 16:45 - 16:50 (0:05)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
4.2 Mbps, 7.1 Kpps Misuse Types:
observed rate: 7.09 Kpps) (by auto-annotation)
TCP SYN
Possible Attack
DoS Host Alert
The "IP Fragmentation" host alert signature severity rate
Medium Incoming Host Alert to 179.6.204.52
configured for "HFC CGN VES - Huawei" has been
195756 149.0% of 10 Kpps using HFC CGN VES - Huawei Jul 19 16:33 - 16:38 (0:05)
exceeded, changing Severity Level from low to medium
7.1 Mbps, 14.9 Kpps Misuse Types:
(expected rate: 10.00 Kpps, observed rate: 14.89 Kpps)
IP Fragmentation
(by auto-annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 151.101.6.2
The "TCP RST" host alert signature has been triggered at
195755 45.0% of 10 Kpps using Teliasonera Jul 19 16:26 - 16:37 (0:11)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
2.1 Mbps, 4.4 Kpps Misuse Types:
observed rate: 2.67 Kpps) (by auto-annotation)
TCP RST
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 173.72.197.187 The "IP Fragmentation" host alert signature has been
195754 63.0% of 10 Kpps using Teliasonera Jul 19 16:18 - 16:25 (0:07) triggered at router "rMPLSPolo1BR02". (expected rate:
62.6 Mbps, 6.3 Kpps Misuse Types: 2.50 Kpps, observed rate: 4.47 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Incoming Host Alert to 2800:200:f100:25a1:618f:f020:60c3:350f
The "UDP" host alert signature has been triggered at
195753 68.0% of 100 Kpps using HFC Prov Norte IPv6 Jul 19 16:14 - 16:19 (0:05)
router "rMPLSPolo1BR02". (expected rate: 50.00 Kpps,
759.4 Mbps, 68.2 Kpps Misuse Types:
observed rate: 68.19 Kpps) (by auto-annotation)
UDP
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.44.76.150 The "IP Fragmentation" host alert signature has been
195752 41.0% of 10 Kpps using Teliasonera Jul 19 16:13 - 16:23 (0:10) triggered at router "rMPLSPolo1BR02". (expected rate:
42.4 Mbps, 4.1 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.42 Kpps) (by auto-
IP Fragmentation annotation)
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 58.82.247.72
The "TCP SYN" host alert signature has been triggered at
195751 66.0% of 10 Kpps using Ntt Jul 19 16:13 - 16:21 (0:08)
router "rMPLSVillaSalvadorBR01". (expected rate: 2.50
3.2 Mbps, 6.6 Kpps Misuse Types:
Kpps, observed rate: 6.34 Kpps) (by auto-annotation)
TCP SYN
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 58.82.247.72
The "TCP SYN" host alert signature has been triggered at
195750 67.0% of 10 Kpps using Gtt Jul 19 16:12 - 16:20 (0:08)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
3.2 Mbps, 6.7 Kpps Misuse Types:
observed rate: 6.74 Kpps) (by auto-annotation)
TCP SYN
page 5 of 6
DoS Host Alert
Possible Attack
Low Outgoing Host Alert from 218.93.206.190
The "TCP SYN" host alert signature has been triggered at
195749 47.0% of 10 Kpps using Teliasonera Jul 19 15:39 - 15:44 (0:05)
router "rMPLSPolo1BR02". (expected rate: 2.50 Kpps,
2.9 Mbps, 4.7 Kpps Misuse Types:
observed rate: 4.70 Kpps) (by auto-annotation)
TCP SYN
DoS Host Alert Possible Attack
Low Outgoing Host Alert from 185.44.76.150 The "IP Fragmentation" host alert signature has been
195748 58.0% of 10 Kpps using Teliasonera Jul 19 15:27 - 15:52 (0:25) triggered at router "rMPLSPolo1BR02". (expected rate:
58.2 Mbps, 5.8 Kpps Misuse Types: 2.50 Kpps, observed rate: 3.33 Kpps) (by auto-
IP Fragmentation annotation)
Possible Attack
DoS Host Alert
The "UDP" host alert signature severity rate configured
Medium Incoming Host Alert to 179.7.136.62
for "MOVIL_CGN_Trujillo" has been exceeded, changing
195747 104.0% of 100 Kpps using MOVIL_CGN_Trujillo Jul 19 15:25 - 15:34 (0:09)
Severity Level from low to medium (expected rate:
66.7 Mbps, 104.1 Kpps Misuse Types:
100.00 Kpps, observed rate: 104.07 Kpps) (by auto-
UDP
annotation)
page 6 of 6