It is also important for a company to check the users' navigation behaviour. Proxy servers have a very important role in a network, acting as an intermediary for requests from clients seeking resources from other servers. The widgets in this tab are based on firewall logs only.
This tree map shows anonymous traffic. Customers can easily check all communications from their servers to Internet anonymous proxies. This type of connections must be monitored because of the dangerous nature of the networks they access. Here we have represented all outgoing traffic to the Dark Web, so we can see real destination IPs and ports, but source IPs are hided by Tor.
Peer-to-peer destination ports
These two column charts show a daily and hourly breakdown of the peer to peer destination ports accessed.
Traffic to low reputation IP addresses through proxies
By last, this cross Sankey diagram shows outgoing traffic that uses proxy servers to get to the Internet. Connections through 8080 port might be monitored, mainly if the destination IPs have low reputation. By using a correlation we are detecting potential internal servers that could be acting as proxy servers, and are sending requests to malicious sites.