Grokking the M2M Attack Matrices