NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.26.0.222 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
194.5.98.144 Active Moloch
GET 403 https://www.iptrackeronline.com/
REQUEST
RESPONSE
GET 301 http://www.iptrackeronline.com/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:57660 -> 164.124.101.2:53 2029710 ET HUNTING Suspicious Domain Request for Possible COVID-19 Domain M2 Potentially Bad Traffic
UDP 192.168.56.102:57660 -> 164.124.101.2:53 2022918 ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity
TCP 192.168.56.102:49814 -> 104.26.0.222:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49814
104.26.0.222:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com fd:85:66:b5:ad:91:10:bc:c3:8b:35:5e:ae:e9:8a:bd:de:97:ac:e9

Snort Alerts

No Snort Alerts