NetWork | ZeroBOX

Network Analysis

IP Address Status Action
134.209.3.189 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
exam.edumation.app 134.209.3.189
GET 200 https://exam.edumation.app/wp-content/themes/twentynineteen/sass/blocks/4bcHpcgYlJKPDXl.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49204 -> 134.209.3.189:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49204
134.209.3.189:443
C=US, O=Let's Encrypt, CN=R3 CN=exam.edumation.app 8e:cb:87:91:e7:e8:18:e5:f8:59:b5:36:03:03:6a:42:be:07:52:d2

Snort Alerts

No Snort Alerts