Show expected-vs-weak-fit destinations clearly
The category page should help reviewers understand why some hosts are routine while others deserve immediate scrutiny.
Secondary Calls Detail
Use This Page When Asking
Is this downstream destination an expected boundary crossing, or the start of a weaker-fit outbound story?
Open c6 raw detailSessions
4
Shared by several runs
Calls
12
Steady reuse pattern
Protocol
https
Expected transport
Attribution
high
Strong session context
Why This Detail Matters
Important Metadata
Boundary path worth review
The raw destination page makes recent call sequence and attribution explicit.
Destination Host
10.0.2.15
IP Address
10.0.2.15
Protocol
http
Port
8080
First Seen
today
Last Seen
22 min ago
What This Detail Should Help Decide
The category page should help reviewers understand why some hosts are routine while others deserve immediate scrutiny.
Those two fields change how quickly a destination can be trusted.
The detail page should frame the boundary question before presenting the recent-call ledger.
Destination-Centered Topology
Useful per destination: caller sessions, endpoint, protocol/port, data volume, likely purpose, and whether the connection is expected, encrypted, and policy-safe.
Destination
10.0.2.15:8080
Representative risky edge because it is plain HTTP and tied to a small but unusual set of calls.
1 session · 3 calls · 0.4 KB avg
Protocol
http
Port
8080
Encryption
none
Current posture
investigate caller
Who initiated the outbound edge.
What the edge itself looks like.
How it differs from the rest of the graph.
The security meaning of the call.
Representative Event Chain
The page should show how the item participates in a readable sequence, not just a pile of supporting rows.
Destination
Protocol, port, and host identity should tell the reviewer what kind of outward path this is immediately.
Caller context
The page should make clear which execution lanes commonly call the host and which ones would look surprising.
Precursor evidence
Boundary meaning changes when the host appears right after sensitive file or capability use.
Follow-up
Recent-call rows remain useful, but the page should first explain why the destination deserves inspection.
c6 Evidence Tables
Recent Calls
c6 shows session, method, path, bytes, time, and attribution on one table.
| Session / User | Method | Path | Status | Bytes | Attribution |
|---|---|---|---|---|---|
| sess_01XFa9q... / unknown | POST | /bridge | 200 | 4.2KB | weak |
| sess_01XFa9q... / alice@company.com | GET | /health | 200 | 0.8KB | medium |
Return To Category
Compare this representative detail against the full category framing and drill targets.
Open Secondary Calls overviewOpen c6 Raw Detail
Use the original detail page for exact raw evidence after the c12 story framing.
Open c6 raw detailOpen c6 Raw List
Compare this item against the broader c6 entity ledger once the representative story is clear.
Open c6 raw list