arparp.opcode == 1arp.opcode == 2arp.dst.hw_mac==00:00:00:00:00:00arp.duplicate-address-detected or arp.duplicate-address-frame((arp) && (arp.opcode == 1)) && (arp.src.hw_mac == target-mac-address)Possible IP address match > 1 IP address announced from a MAC address
MAC: 00:0c:29:e2:18:b4 IP: 192.168.1.25
Possible ARP spoofing attempt.
2 MAC addresses claimed the same IP address (192.168.1.1). The " 192.168.1.1" IP address is a possible gateway address.
MAC1: 50:78:b3:f3:cd:f4 MAC2: 00:0c:29:e2:18:b4
Possible ARP spoofing attempt. The MAC address that ends with "b4" claims to have a different/new IP address.
MAC: 00:0c:29:e2:18:b4 IP: 192.168.1.1
Possible ARP flooding attempt. The MAC address that ends with "b4" crafted multiple ARP requests against a range of IP addresses.
MAC: 00:0c:29:e2:18:b4 IP: 192.168.1.xxx