From: Detecting compromised email accounts via login behavior characterization
Subnet | In dataset | Type | IP addrs | Associated accounts | Maximum login times |
---|---|---|---|---|---|
A | Dateset-1 | Malicious | 1 | 129 | 24 |
B | Dateset-1 | Malicious | 9 | 7 | 11485 |
C | Dateset-3 | Uncertain | 1 | 2 | 11 |
D | Dateset-3 | Uncertain | 1 | 1 | 14 |
E | Dateset-5 | Uncertain | 1 | 1 | 2 |
F | Dateset-5 | Uncertain | 1 | 1 | 9 |
G | Dateset-5 | Uncertain | 1 | 1 | 1 |
H | Dateset-5 | Uncertain | 1 | 1 | 1 |
I | Dateset-5 | Uncertain | 1 | 1 | 2 |
J | Dateset-5 | Uncertain | 1 | 1 | 1 |
K | Dateset-6 | Malicious | 1 | 55 | 4 |
L | Dateset-7 | Uncertain | 1 | 1 | 2 |
M | Dateset-7 | Uncertain | 1 | 1 | 9 |