Plugins
Loading...

Query: List protocols

Description

Explore which protocols are most frequently used in a specific scan to identify potential security risks or unusual network activity. This can help in understanding the network behavior and devise strategies for improved security.

Query

Tables used in this query:

SQL