Suspicious Connections Report report reveals traffic and conversations with IP addresses identified in blacklist databases or tracked using the IP Reputation Library.
Note: You add tracking of suspicious IPs using Internet community resources such as Tor lists from the IP Reputation Library.
To display Flow and Packet measurements, click a column heading () for column selection list (). You can also include:
Choose source. , Choose a networking device or single physical or virtual interface you want to see Suspicious Connections Report measurements for. Choose traffic direction across an interface.
Chart, adjust output, and visualize. Fine tune report presentation and range of values displayed using the Report Settings dialog (optional).
Most generated Suspicious Connections Report report data can be printed, shared, and exported when selecting Expand () from the Dashboard Options () menu. After the report has been expanded, select export () to access the following options: