NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.26.13.31 Active Moloch
117.18.232.200 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
217.107.34.191 Active Moloch
87.251.71.193 Active Moloch
88.99.66.31 Active Moloch
37.187.95.110 Active Moloch
GET 200 https://42nn.hellomir.ru/SystemServiceModelChannelsHttpInput54082
REQUEST
RESPONSE
GET 200 https://api.ip.sb/geoip
REQUEST
RESPONSE
GET 200 https://iplogger.org/1uP9s7
REQUEST
RESPONSE
GET 200 https://iplogger.org/favicon.ico
REQUEST
RESPONSE
POST 100 http://87.251.71.193//
REQUEST
RESPONSE
POST 100 http://87.251.71.193//
REQUEST
RESPONSE
POST 100 http://87.251.71.193//
REQUEST
RESPONSE
POST 100 http://87.251.71.193//
REQUEST
RESPONSE
GET 200 http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.102 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49806 -> 217.107.34.191:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49812 -> 104.26.13.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49835 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49834 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 87.251.71.193:80 -> 192.168.56.102:49811 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode
TCP 87.251.71.193:80 -> 192.168.56.102:49811 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49806
217.107.34.191:443
C=US, O=Let's Encrypt, CN=R3 CN=*.42nn.hellomir.ru bf:8b:b3:41:06:50:88:00:90:a1:aa:83:eb:29:4d:76:37:c5:32:e5
TLSv1
192.168.56.102:49812
104.26.13.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 5e:7d:19:2d:d7:66:0c:63:45:a5:24:8f:b7:db:35:a7:61:6d:89:0e
TLSv1
192.168.56.102:49835
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.102:49834
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb

Snort Alerts

No Snort Alerts