Can you spot malicious network requests? Analyze the network traffic and decide if the request is malicious or safe.