NetWork | ZeroBOX

Network Analysis

IP Address Status Action
172.67.188.154 Active Moloch
179.189.229.254 Active Moloch
164.124.101.2 Active Moloch
198.251.89.86 Active Moloch
221.147.172.5 Active Moloch
46.99.175.149 Active Moloch
Name Response Post-Analysis Lookup
a.tmp.ninja 198.251.89.86
GET 200 https://a.tmp.ninja/aWRwMVU
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.101 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49201 -> 198.251.89.86:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49201
198.251.89.86:443
C=US, O=Let's Encrypt, CN=R3 CN=tmp.ninja 18:1e:74:ce:9a:11:17:62:1e:3f:92:91:ef:9c:28:d4:4c:9b:c7:29

Snort Alerts

No Snort Alerts