NetWork | ZeroBOX

Network Analysis

IP Address Status Action
164.124.101.2 Active Moloch
54.230.166.71 Active Moloch
GET 200 https://aws.amazon.com/
REQUEST
RESPONSE
GET 200 https://aws.amazon.com/
REQUEST
RESPONSE
GET 200 https://aws.amazon.com/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49205 -> 54.230.166.71:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:54056 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 192.168.56.101:49207 -> 54.230.166.71:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49208 -> 54.230.166.71:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49205
54.230.166.71:443
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon CN=aws.amazon.com 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22
TLSv1
192.168.56.101:49207
54.230.166.71:443
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon CN=aws.amazon.com 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22
TLSv1
192.168.56.101:49208
54.230.166.71:443
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon CN=aws.amazon.com 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22

Snort Alerts

No Snort Alerts