NetWork | ZeroBOX

Network Analysis

IP Address Status Action
176.31.32.198 Active Moloch
104.21.35.128 Active Moloch
164.124.101.2 Active Moloch
172.67.133.24 Active Moloch
50.16.239.65 Active Moloch
62.109.1.30 Active Moloch
GET 200 https://best-supply-link.xyz/?user_auth=p4_1
REQUEST
RESPONSE
GET 200 https://best-supply-link.xyz/?user_auth=p4_2
REQUEST
RESPONSE
GET 0 https://best-supply-link.xyz/?user_auth=p4_3
REQUEST
RESPONSE
POST 100 https://electronspectroscopy.bar/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49164 -> 104.21.35.128:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49171 -> 172.67.133.24:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49164
104.21.35.128:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 72:ae:40:01:ab:8e:40:ff:b8:85:8c:54:dc:c0:99:3b:af:a3:50:99
TLSv1
192.168.56.102:49171
172.67.133.24:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com b4:b7:65:f9:96:ff:20:7e:c9:7b:a0:53:1b:14:98:ac:d6:aa:48:00

Snort Alerts

No Snort Alerts