1 | initial version |
Hello Wutai
Your question can hardly be answered without a look at the full trace file.
If you seek help in a potential hacking attack we need a lot more information. Some of the first questions are:
Please be aware, that a trace file can include sensitive information like passwords or e-mails transmitted in plain text.
In case of a confirmed network intrusion you might want to hire some professional help.
Good luck!