NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
172.67.200.215 Active Moloch
172.67.215.92 Active Moloch
172.67.222.125 Active Moloch
208.95.112.1 Active Moloch
34.97.69.225 Active Moloch
GET 200 https://live.goatgame.live/userf/dat/2201/sqlite.dat
REQUEST
RESPONSE
GET 200 https://live.goatgame.live/userf/dat/sqlite.dll
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://by.dirfgame.com/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://ol.gamegame.info/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://by.dirfgame.com/report7.4.php
REQUEST
RESPONSE
GET 200 http://ip-api.com/json/?fields=8198
REQUEST
RESPONSE
POST 200 http://by.dirfgame.com/report7.4.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49162 -> 172.67.222.125:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49168 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49168 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49168 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
TCP 192.168.56.102:49168 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49162
172.67.222.125:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 6e:af:7d:03:68:a7:53:bb:5d:6a:ab:d0:a0:25:76:e7:15:3c:7d:ae

Snort Alerts

No Snort Alerts