// HOME IP $vulns = -1; $_ctx = $ctx; $homelan = ''; $hostname = ''; $_net_id = preg_match('/src/', $prefix) ? $event_info['src_net'] : $event_info['dst_net']; $host_obj = Asset_host::get_object($conn, $uuid, TRUE); if (is_object($host_obj)) { $hostname = $host_obj->get_name(); $_ctx = $host_obj->get_ctx(); } $host_output = Asset_host::get_extended_name($conn, $geoloc, $ip, $_ctx, $uuid, $_net_id); $homelan = $host_output['is_internal'] ? 'bold' : ''; if ($homelan) { $location = '<strong>' . _('UNKNOWN') . '</strong>'; $vulns = Vulnerabilities::get_latest_vulns($conn, $ip); } $net = array_shift(Asset_host::get_closest_net($conn, $ip, $_ctx)); if (is_array($net) && !empty($net)) { $location = ''; if ($net['icon'] != '') { $location = "<img src='data:image/png;base64," . base64_encode($net['icon']) . "' border='0'> "; } $location .= '<strong>' . strtoupper($net['name']) . '</strong> (' . $net['ips'] . ')'; } // OTX / Vulns $subfix = str_replace('_t', '_', $prefix); $rep_tooltip = Reputation::getreptooltip($event_info['rep_prio' . $subfix], $event_info['rep_rel' . $subfix], $event_info['rep_act' . $subfix], FALSE); if ($info_ip['rep'] == 1) { $labs = Reputation::getlabslink($ip); $otx = '<a href="' . $labs . '" class="otx" target="_blank" data-title="' . $rep_tooltip . '">' . _('Yes') . '</a>';