This indicates detection of suspicious traffics that might belong to various malicious files related to IoT based devices.
The malicious software attempts to infect the device and abuse it for illegal purposes.
All Unix based operating systems
System Compromise: Remote attackers can gain control of vulnerable systems.
Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.