NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.54.36 Active Moloch
148.251.234.93 Active Moloch
164.124.101.2 Active Moloch
45.144.28.189 Active Moloch
GET 0 https://14mmf.za.com/analytics.php?pub=a02&guid=017bd04f-b3bf-45b6-8167-9e8f41ff87bf&sign=178004f0465ebfb5
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49163 -> 148.251.234.93:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 148.251.234.93:443 -> 192.168.56.101:49164 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.101:49161 -> 104.21.54.36:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49161
104.21.54.36:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=14mmf.za.com aa:41:3d:d8:cf:f6:f8:cf:3e:b5:c5:dd:03:65:99:87:f3:4f:f5:36

Snort Alerts

No Snort Alerts