NetWork | ZeroBOX

Network Analysis

IP Address Status Action
121.254.136.57 Active Moloch
164.124.101.2 Active Moloch
185.183.32.227 Active Moloch
81.177.141.85 Active Moloch
GET 200 https://d.ckauni.ru/
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
81.177.141.85 192.168.56.101 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49204 -> 81.177.141.85:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49204
81.177.141.85:443
C=US, O=Let's Encrypt, CN=R3 CN=d.ckauni.ru 89:25:a3:9e:f4:64:a9:00:9b:7c:ed:41:b0:6c:dc:7d:4e:90:8a:66

Snort Alerts

No Snort Alerts