Study the following log extract and identify the attack.