NetWork | ZeroBOX

Network Analysis

IP Address Status Action
111.90.146.149 Active Moloch
172.67.188.154 Active Moloch
104.26.12.31 Active Moloch
164.124.101.2 Active Moloch
172.67.140.223 Active Moloch
172.67.160.101 Active Moloch
172.67.221.103 Active Moloch
193.150.103.37 Active Moloch
45.129.99.59 Active Moloch
88.99.66.31 Active Moloch
67.198.134.186 Active Moloch
GET 0 https://niemannbest.me/?user=p12_1
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_2
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_3
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_4
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_5
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_6
REQUEST
RESPONSE
POST 100 https://the-lead-bitter.com/
REQUEST
RESPONSE
GET 0 https://niemannbest.me/?user=p12_7
REQUEST
RESPONSE
GET 0 https://api.ip.sb/ip
REQUEST
RESPONSE
GET 200 https://iplogger.org/1a4jd7
REQUEST
RESPONSE
GET 200 https://iplogger.org/1a5jd7
REQUEST
RESPONSE
POST 100 https://speeddatingstudio.com/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49168 -> 172.67.221.103:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49178 -> 172.67.160.101:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49182 -> 104.26.12.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49183 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49184 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49185 -> 172.67.140.223:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49168
172.67.221.103:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 16:7c:ef:5c:eb:cb:66:bc:19:9f:3a:95:c8:e3:06:1c:95:6b:0b:11
TLSv1
192.168.56.103:49178
172.67.160.101:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 68:03:16:8a:1d:7a:49:54:e9:b9:01:a7:10:c5:31:81:ab:f3:f6:f8
TLSv1
192.168.56.103:49182
104.26.12.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9
TLSv1
192.168.56.103:49183
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb
TLSv1
192.168.56.103:49184
88.99.66.31:443
None None None
TLSv1
192.168.56.103:49185
172.67.140.223:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 03:d8:32:f1:aa:8f:dc:7e:26:ab:ab:a0:a4:3b:db:67:c8:9d:2e:d5

Snort Alerts

No Snort Alerts