Fig. 2From: Detection of illicit cryptomining using network metadataExample of stratum communication between a mining pool and clientBack to article page