Procedure
- Go to .
- Specify the search criteria.
- Host (IP address or host name)
- Period
- Press ENTER.All suspicious objects matching the search criteria appear.
- View the results.HeaderDescriptionHostView the IP address or host name used by the suspicious object.PortView the port number used by the suspicious object.Risk LevelView the level of potential danger in a sample after Virtual Analyzer executes the file or opens the URL.Related MessagesView the messages containing the same suspicious object.Latest Message RecipientsView the most recent recipients of the email message containing suspicious objects.Latest DetectionView the date and time Virtual Analyzer last found the suspicious object in a submitted object.