NetWork | ZeroBOX

Network Analysis

IP Address Status Action
121.254.136.57 Active Moloch
123.253.24.22 Active Moloch
164.124.101.2 Active Moloch
195.210.46.42 Active Moloch
63.247.140.170 Active Moloch
GET 404 http://oubaina.com/wp-includes/lqkz_nvr_1avf4/
REQUEST
RESPONSE
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE
GET 404 http://bike-nomad.com/cgi-bin/7n_0x0_62mnzyh9q/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49168 -> 195.210.46.42:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49168
195.210.46.42:443
C=US, O=Let's Encrypt, CN=R3 CN=msbc.kz 02:d3:33:2b:fe:3b:67:e2:96:59:09:80:36:d7:9e:f4:dc:38:ac:47

Snort Alerts

No Snort Alerts