NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.67.197 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
kakosidobrosam.gq 172.67.180.37
GET 200 https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-CBCFAE6F7B8D32422898307A805F1FED.html
REQUEST
RESPONSE
GET 200 https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-24CE7FE78D268B93DB4AD64C9B7971DD.html
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:62324 -> 164.124.101.2:53 2025104 ET INFO DNS Query for Suspicious .gq Domain Potentially Bad Traffic
TCP 192.168.56.101:49199 -> 104.21.67.197:443 2025108 ET INFO Suspicious Domain (*.gq) in TLS SNI Potentially Bad Traffic
TCP 192.168.56.101:49199 -> 104.21.67.197:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49199
104.21.67.197:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com a2:99:7f:61:26:e9:24:3e:96:d0:98:83:eb:e0:35:eb:07:a8:19:f8

Snort Alerts

No Snort Alerts