From: Apply machine learning techniques to detect malicious network traffic in cloud computing
Source ip address |
---|
142.104.64.202 |
172.16.1.21 |
172.16.1.255 |
172.16.1.24 |
172.16.1.20 |
172.16.1.23 |
172.16.1.10 |
172.16.1.28 |
172.16.1.26 |
172.16.1.19 |
172.16.1.27 |
192.168.0.10 |
192.168.0.8 |
192.168.0.9 |
255.255.255.255 |
142.104.64.196 |
142.104.80.2 |
142.104.6.1 |
134.87.154.134 |
134.87.157.129 |
142.104.191.194 |
206.12.96.150 |
206.12.96.149 |
206.12.96.143 |
206.12.96.142 |
206.12.96.141 |
206.12.96.239 |
206.12.96.240 |
206.12.59.162 |
206.12.48.43 |
172.16.1.254 |
172.16.1.17 |
172.16.1.16 |
206.12.48.115 |
2.89.202.164 |
206.87.164.188 |
51.218.248.166 |
188.49.184.140 |
220.54.25.114 |
37.105.194.65 |
5.156.104.155 |
51.36.227.160 |
151.255.23.160 |
94.48.53.15 |