NetWork | ZeroBOX

Network Analysis

IP Address Status Action
103.237.169.99 Active Moloch
121.254.136.27 Active Moloch
152.228.216.255 Active Moloch
164.124.101.2 Active Moloch
208.87.225.118 Active Moloch
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 404 http://clanbaker.org/css/khhl7kT2n69n/
REQUEST
RESPONSE

ICMP traffic

Source Destination ICMP Type Data
192.168.56.103 164.124.101.2 3
192.168.56.103 164.124.101.2 3

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 152.228.216.255:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 152.228.216.255:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49162 -> 103.237.169.99:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 152.228.216.255:443 -> 192.168.56.103:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49162
103.237.169.99:443
C=US, O=Let's Encrypt, CN=R3 CN=cs.com.sg 35:f9:b3:54:db:e1:bd:7b:fa:18:f4:fd:95:0b:18:ab:fd:d7:c0:c8

Snort Alerts

No Snort Alerts