NetWork | ZeroBOX

Network Analysis

IP Address Status Action
117.18.232.200 Active Moloch
142.250.199.67 Active Moloch
142.250.204.110 Active Moloch
142.250.204.35 Active Moloch
142.250.204.42 Active Moloch
142.250.207.67 Active Moloch
142.250.66.109 Active Moloch
142.250.66.142 Active Moloch
164.124.101.2 Active Moloch
172.217.161.161 Active Moloch
172.217.24.100 Active Moloch
172.67.205.79 Active Moloch
23.206.175.43 Active Moloch
23.59.72.17 Active Moloch
23.59.72.9 Active Moloch

GET 404 https://laborke.ru/uplcv?utm_term=biografia+de+lawrence+kohlberg+resumen
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 204 http://www.gstatic.com/generate_204
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 304 http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49167 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49184 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49183 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49182 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49166 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49185 -> 172.67.205.79:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49167
172.67.205.79:443
C=US, O=Let's Encrypt, CN=R3 CN=*.laborke.ru f6:0b:a5:f1:67:08:42:2c:7c:df:9d:3a:bc:f2:17:2c:83:a5:ab:31
TLSv1
192.168.56.102:49184
172.67.205.79:443
None None None
TLSv1
192.168.56.102:49183
172.67.205.79:443
None None None
TLSv1
192.168.56.102:49182
172.67.205.79:443
None None None
TLS 1.3
192.168.56.102:49195
172.217.24.100:443
None None None
TLSv1
192.168.56.102:49166
172.67.205.79:443
C=US, O=Let's Encrypt, CN=R3 CN=*.laborke.ru f6:0b:a5:f1:67:08:42:2c:7c:df:9d:3a:bc:f2:17:2c:83:a5:ab:31
TLS 1.3
192.168.56.102:49204
142.250.204.110:443
None None None
TLS 1.3
192.168.56.102:49193
142.250.204.35:443
None None None
TLS 1.3
192.168.56.102:49203
142.250.199.67:443
None None None
TLS 1.3
192.168.56.102:49214
142.250.66.142:443
None None None
TLS 1.3
192.168.56.102:49202
142.250.207.67:443
None None None
TLS 1.3
192.168.56.102:49201
142.250.207.67:443
None None None
TLS 1.3
192.168.56.102:49216
172.67.205.79:443
None None None
TLS 1.3
192.168.56.102:49199
142.250.204.42:443
None None None
TLSv1
192.168.56.102:49185
172.67.205.79:443
None None None
TLS 1.3
192.168.56.102:49212
172.217.161.161:443
None None None
TLS 1.3
192.168.56.102:49210
172.217.24.99:443
None None None
TLS 1.3
192.168.56.102:49196
172.217.24.100:443
None None None
TLS 1.3
192.168.56.102:49194
142.250.66.109:443
None None None
TLS 1.3
192.168.56.102:49200
142.250.207.67:443
None None None
TLS 1.3
192.168.56.102:49206
172.67.205.79:443
None None None
TLS 1.3
192.168.56.102:49215
172.67.205.79:443
None None None

Snort Alerts

No Snort Alerts