Get Involved
Query: List protocols
Description
Explore which protocols are most frequently used in a specific scan to identify potential security risks or unusual network activity. This can help in understanding the network behavior and devise strategies for improved security.
Query
Tables used in this query: