Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
www.kenuot.com | 188.225.87.175 | |
www.fddnice.pw | 103.155.92.58 | |
iplogger.org | 88.99.66.31 | |
www.cncode.pw | 144.202.76.47 |
- UDP Requests
-
-
192.168.56.102:50839 164.124.101.2:53
-
192.168.56.102:54660 164.124.101.2:53
-
192.168.56.102:57660 164.124.101.2:53
-
192.168.56.102:61459 164.124.101.2:53
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:56752 239.255.255.250:1900
-
192.168.56.102:56754 239.255.255.250:3702
-
192.168.56.102:57661 239.255.255.250:3702
-
192.168.56.102:61460 239.255.255.250:3702
-
GET
200
https://iplogger.org/1s4qp7
REQUEST
RESPONSE
BODY
GET /1s4qp7 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
Host: iplogger.org
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 23 Apr 2021 01:05:20 GMT
Content-Type: image/png
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=s6bmevb1822ato0s1o1sg193s6; path=/; HttpOnly
Pragma: no-cache
Set-Cookie: clhf03028ja=175.208.134.150; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=259908271; path=/
Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Answers:
whoami: 2545b4ccbc3d20c553c5c74e8fab8603327ecdc0f45cc13358586ab2a94d337e
Strict-Transport-Security: max-age=31536000; preload
X-Frame-Options: DENY
GET
200
http://www.cncode.pw/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
Host: www.cncode.pw
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 23 Apr 2021 01:05:19 GMT
Content-Type: text/html
Content-Length: 3196
Connection: keep-alive
Vary: Accept-Encoding
Last-Modified: Mon, 01 Mar 2021 02:11:09 GMT
ETag: "c7c-5bc7021910a1f"
Accept-Ranges: bytes
GET
200
http://www.fddnice.pw/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
Host: www.fddnice.pw
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 23 Apr 2021 01:05:42 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 14
Connection: keep-alive
X-Powered-By: PHP/5.6.40
POST
200
http://www.kenuot.com/Home/Index/lkdinl
REQUEST
RESPONSE
BODY
POST /Home/Index/lkdinl HTTP/1.1
Content-Type: application/x-www-form-urlencoded;charset=utf-8
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
Host: www.kenuot.com
Content-Length: 197
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 23 Apr 2021 01:05:42 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.6.40
Set-Cookie: PHPSESSID=h6gtek2fm0l7peqjmhf9nu27f5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.102:57660 -> 164.124.101.2:53 | 2016778 | ET DNS Query to a *.pw domain - Likely Hostile | Potentially Bad Traffic |
UDP 192.168.56.102:50839 -> 164.124.101.2:53 | 2016778 | ET DNS Query to a *.pw domain - Likely Hostile | Potentially Bad Traffic |
TCP 192.168.56.102:49806 -> 88.99.66.31:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49805 -> 144.202.76.47:80 | 2016777 | ET INFO HTTP Request to a *.pw domain | Potentially Bad Traffic |
TCP 192.168.56.102:49815 -> 103.155.92.58:80 | 2016777 | ET INFO HTTP Request to a *.pw domain | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49806 88.99.66.31:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA | CN=*.iplogger.org | 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb |
Snort Alerts
No Snort Alerts