NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
185.141.27.166 Active Moloch
217.107.34.191 Active Moloch
GET 200 https://h.kowashitekata.ru/SystemServiceModelDescriptionMetadataExchangeClientEncodingHelper13102
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.153 192.168.56.102 3
190.2.158.155 192.168.56.102 3
190.2.158.155 192.168.56.102 3
190.2.158.155 192.168.56.102 3
190.2.158.155 192.168.56.102 3
190.2.158.155 192.168.56.102 3
190.2.158.155 192.168.56.102 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49806 -> 217.107.34.191:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49806
217.107.34.191:443
C=US, O=Let's Encrypt, CN=R3 CN=*.h.kowashitekata.ru 26:fd:ba:9f:f8:35:ae:a6:7d:eb:72:28:2e:2f:92:5d:47:56:16:5c

Snort Alerts

No Snort Alerts