Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
boehm-kavon15lc.ru.com | 34.95.253.189 | |
jahthroneafricancrafts.com | 75.119.136.137 | |
glsiba.org | 204.11.58.33 | |
rosenbaum-milan15y.ru.com | 34.95.253.189 |
- TCP Requests
-
-
192.168.56.101:49197 192.168.56.103:2869
-
192.168.56.101:49203 192.168.56.103:5357
-
192.168.56.102:49823 192.168.56.103:2869
-
192.168.56.102:49828 192.168.56.103:5357
-
192.168.56.103:49597 204.11.58.33:443glsiba.org
-
192.168.56.103:49598 204.11.58.33:443glsiba.org
-
192.168.56.103:49599 204.11.58.33:443glsiba.org
-
192.168.56.103:49593 34.95.253.189:80rosenbaum-milan15y.ru.com
-
192.168.56.103:49596 34.95.253.189:80rosenbaum-milan15y.ru.com
-
192.168.56.103:49602 75.119.136.137:443jahthroneafricancrafts.com
-
192.168.56.103:49604 75.119.136.137:443jahthroneafricancrafts.com
-
192.168.56.103:49605 75.119.136.137:443jahthroneafricancrafts.com
-
- UDP Requests
-
-
192.168.56.103:58285 164.124.101.2:53
-
192.168.56.103:58575 164.124.101.2:53
-
192.168.56.103:58935 164.124.101.2:53
-
192.168.56.103:64714 164.124.101.2:53
-
192.168.56.103:65511 164.124.101.2:53
-
192.168.56.103:1900 192.168.56.101:62445
-
192.168.56.103:3702 192.168.56.101:62449
-
192.168.56.103:3702 192.168.56.102:61460
-
192.168.56.103:137 192.168.56.255:137
-
192.168.56.103:138 192.168.56.255:138
-
192.168.56.103:1900 239.255.255.250:1900
-
192.168.56.103:49152 239.255.255.250:3702
-
192.168.56.103:50368 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.103:123
-
GET
200
http://boehm-kavon15lc.ru.com/body.html
REQUEST
RESPONSE
BODY
GET /body.html HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C; .NET4.0E)
Host: boehm-kavon15lc.ru.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 16 Apr 2021 00:53:58 GMT
Server: Apache/2.4.6 (CentOS) PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
GET
200
http://rosenbaum-milan15y.ru.com/body.html
REQUEST
RESPONSE
BODY
GET /body.html HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C; .NET4.0E)
Host: rosenbaum-milan15y.ru.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 16 Apr 2021 00:54:00 GMT
Server: Apache/2.4.6 (CentOS) PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 204.11.58.33:443 -> 192.168.56.103:49599 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.103:49604 -> 75.119.136.137:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 75.119.136.137:443 -> 192.168.56.103:49605 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.103:49597 -> 204.11.58.33:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49598 -> 204.11.58.33:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49602 -> 75.119.136.137:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts