NetWork | ZeroBOX

Network Analysis

IP Address Status Action
148.251.234.93 Active Moloch
164.124.101.2 Active Moloch
178.18.252.110 Active Moloch
GET 200 https://www.ippfinfo.top/
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:50800 -> 164.124.101.2:53 2023883 ET DNS Query to a *.top domain - Likely Hostile Potentially Bad Traffic
TCP 148.251.234.93:443 -> 192.168.56.103:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49164 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49161 -> 178.18.252.110:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49163 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49161
178.18.252.110:443
C=CN, O=TrustAsia Technologies, Inc., CN=TrustAsia RSA DV TLS CA G2 CN=www.ippfinfo.top d3:a0:ee:8d:57:c1:a8:45:01:49:11:aa:77:a0:96:06:3f:c2:e1:5b

Snort Alerts

No Snort Alerts