// HOME IP
$vulns = -1;
$_ctx = $ctx;
$homelan = '';
$hostname = '';
$_net_id = preg_match('/src/', $prefix) ? $event_info['src_net'] : $event_info['dst_net'];
$host_obj = Asset_host::get_object($conn, $uuid, TRUE);
if (is_object($host_obj)) {
    $hostname = $host_obj->get_name();
    $_ctx = $host_obj->get_ctx();
}
$host_output = Asset_host::get_extended_name($conn, $geoloc, $ip, $_ctx, $uuid, $_net_id);
$homelan = $host_output['is_internal'] ? 'bold' : '';
if ($homelan) {
    $location = '<strong>' . _('UNKNOWN') . '</strong>';
    $vulns = Vulnerabilities::get_latest_vulns($conn, $ip);
}
$net = array_shift(Asset_host::get_closest_net($conn, $ip, $_ctx));
if (is_array($net) && !empty($net)) {
    $location = '';
    if ($net['icon'] != '') {
        $location = "<img src='data:image/png;base64," . base64_encode($net['icon']) . "' border='0'> ";
    }
    $location .= '<strong>' . strtoupper($net['name']) . '</strong> (' . $net['ips'] . ')';
}
// OTX / Vulns
$subfix = str_replace('_t', '_', $prefix);
$rep_tooltip = Reputation::getreptooltip($event_info['rep_prio' . $subfix], $event_info['rep_rel' . $subfix], $event_info['rep_act' . $subfix], FALSE);
if ($info_ip['rep'] == 1) {
    $labs = Reputation::getlabslink($ip);
    $otx = '<a href="' . $labs . '" class="otx" target="_blank" data-title="' . $rep_tooltip . '">' . _('Yes') . '</a>';