Document information

Document ID:5415
Subject:Intrusion Detection Logs
Creation date:12/28/20 11:18 AM
Last modified on:12/28/20 11:39 AM

Intrusion Detection Logs

Intrusion Detection log snippet

The image above is a snippet from one of the intrusion detection logs: AuthTerminate.log, ConnTerminate.log, FromTerminate.log, HelloTerminate.log, rcptTerminate.log, TimeoutTerminate.log and SMTPError.log.

Any one of these logs will look similar to the with the exception of the third column.

Column # Description
1 IP address of the sender.
2 Timestamp in Java epoch format.
3 Event ID - this is for internal use only.

Add a comment to this document

Do you have a helpful tip related to this document that you'd like to share with other users? Please add it below. Your name and tip will appear at the end of the document text.
Your name:
Your email:
Hide my email address
Verification code:
Enter the verification code you see above more submitting your tip
Tip:Please limit tips to 1000 characters