Potentially both depending on severity since Anti-bot is a post infection mitigation i.e. we are preventing communication with C2 implying something is already occuring on the machine.
Also note:
1. The user didn't necessarily browse to this address themselves so expecting it in the browser history is not fool proof.
2. In R81 and higher we altered/improved the logging for Anti-bot DNS malware trap events to ensure clarity around events previously shown as "detect".
3. Have you reviewed other forensics from the machine or your endpoint solution?
CCSM R77/R80/ELITE