For the packet capture files of Global Defense Matched, Zone Attack Matched or Zone Anomaly Matched, you can obtain attack sources by tracing a packet capture file. Suspicious IP address can also be blacklisted for effective attack defense.
The packet capture task of Global Defense Matched, Zone Attack Matched or Zone Anomaly Matched has been created and enabled.
of a packet capture file in the Operation column to trace attack sources.

| Parameter | Description |
|---|---|
| Number of Packets | Indicates the number of packets sent during attacks. |
| Number of Source IP Addresses | Indicates the number of the source IP addresses of attackers. |
| Source IP Address | Indicates the source IP address of the attacker. |
| Protocol Type | Indicates the protocol type of attack packets. |
| Destination Port | Indicates the destination port of attack packets. |
| Attack Times | Indicate the number of attacks launched by the attacker. |