NetWork | ZeroBOX

Network Analysis

IP Address Status Action
162.159.128.233 Active Moloch
164.124.101.2 Active Moloch
3.209.207.48 Active Moloch
GET 200 https://httpbin.org/ip
REQUEST
RESPONSE
POST 100 https://discord.com/api/webhooks/879386891068256349/bvEK4gAVFnRBb9sg3YV7yiiYRziQj7jLUdVKqAImI0PeKJ90iPJWMn4wivvwSYJ0o9WN
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49170 -> 3.209.207.48:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49171 -> 162.159.128.233:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49170
3.209.207.48:443
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon CN=httpbin.org ca:ff:2f:cd:9d:a3:00:6c:86:17:a0:4c:8b:fb:93:4d:75:78:50:76
TLSv1
192.168.56.102:49171
162.159.128.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com af:ff:1b:9d:0f:f5:f2:ad:ef:c8:c3:f5:45:0f:7f:e8:20:a0:79:0a

Snort Alerts

No Snort Alerts