NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.19.200 Active Moloch
107.161.183.42 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
185.104.45.26 Active Moloch
GET 200 https://makolet.nsmatrix3.com/wp-content/plugins/woocommerce/templates/auth/gnq4mYeZYgL4dN.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 107.161.183.42:443 -> 192.168.56.102:49814 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49812 -> 107.161.183.42:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49813 -> 107.161.183.42:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49816 -> 185.104.45.26:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49816
185.104.45.26:443
C=US, O=Let's Encrypt, CN=R3 CN=makolet.nsmatrix3.com 50:67:b8:26:93:10:29:9e:8f:74:28:b0:48:5f:c2:1b:11:b6:e1:87

Snort Alerts

No Snort Alerts