NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
51.15.139.10 Active Moloch
Name Response Post-Analysis Lookup
pxlme.me 51.15.139.10
GET 200 https://pxlme.me/25hNv_MR
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 192.168.56.103 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49202 -> 51.15.139.10:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49202
51.15.139.10:443
C=US, O=Let's Encrypt, CN=R3 CN=pxlme.me 39:b0:10:40:5d:f8:20:f1:b0:1d:79:3f:f5:c8:0d:06:58:02:61:bc

Snort Alerts

No Snort Alerts