The application name used in the anomalous login attempt.
The authentication method used by the user involved in the finding.
The name of the database instance involved in the anomalous login attempt.
The version of the Secure Socket Layer (SSL) used for the network.
The user name used in the anomalous login attempt.