LHS IT and Cybersecurity Classes
This creates a timeline of connection attempts that helps investigators map brute-force activities and successful breaches.