. . "Some additional info can usually be gathered from the network but that would almost certainly be the sort of activity that should be classified as malicious." . .