The data is similat to the old one -> Syslog and ICMP Type-11, Code-0 consuming the most flow CPU resources. More than the syslog traffic, I would consider the ICMP traffic to be a problem. But the IP is different this time.
Reverse IP lookup for the ICMP traffic destination seen last time: 60.9.185.16 China
inetnum: 60.0.0.0 - 60.10.255.255 netname: UNICOM-HE descr: China Unicom Hebei Province Network descr: China Unicom country: CN admin-c: CH1302-AP tech-c: KL984-AP remarks: service provider
IP address from the new data: 78.14.217.143 Italy
inetnum: 78.14.0.0 - 78.14.255.255 netname: TISCALINET descr: Tiscalinet country: IT admin-c: PC2538-RIPE admin-c: FB2233-RIPE tech-c: PC2538-RIPE remarks: ADSL Wholesale Customers
One more:178.54.214.66 Ukraine
inetnum: 178.54.128.0 - 178.54.255.255 netname: MEREZHA-NET descr: PP Merezha country: UA org: ORG-PA292-RIPE admin-c: MAC104-RIPE tech-c: MAC104-RIPE status: ASSIGNED PI
Any way you can identify if they are legitimate user IPs trying to connect to your network?
Also, please PM me the JTAC case number as well.