Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
ultimatescamrecovery.com | 104.219.248.27 | |
google.com | 142.250.76.142 |
- UDP Requests
-
-
192.168.56.102:62846 164.124.101.2:53
-
192.168.56.102:63709 164.124.101.2:53
-
192.168.56.102:64513 164.124.101.2:53
-
192.168.56.102:137 192.168.56.103:137
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:62849 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
301
http://ultimatescamrecovery.com/r/tz.jpg
REQUEST
RESPONSE
BODY
GET /r/tz.jpg HTTP/1.1
Host: ultimatescamrecovery.com
Connection: Keep-Alive
HTTP/1.1 301 Moved Permanently
keep-alive: timeout=5, max=100
content-type: text/html
content-length: 707
date: Mon, 10 Apr 2023 00:31:21 GMT
server: LiteSpeed
location: https://ultimatescamrecovery.com/r/tz.jpg
x-turbo-charged-by: LiteSpeed
ICMP traffic
Source | Destination | ICMP Type | Data |
---|---|---|---|
192.168.56.102 | 142.250.204.142 | 8 | abcdefghijklmnopqrstuvwabcdefghi |
142.250.204.142 | 192.168.56.102 | 0 | abcdefghijklmnopqrstuvwabcdefghi |
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49164 -> 104.219.248.27:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49165 -> 104.219.248.27:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts