Network Analysis
IP Address | Status | Action |
---|---|---|
3.22.15.135 | Active | Moloch |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
- TCP Requests
No traffic
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 3.22.15.135:18642 | 2034945 | ET MALWARE Win32/Suspected Reverse Shell Connection | A Network Trojan was detected |
TCP 192.168.56.103:49161 -> 3.22.15.135:18642 | 2102123 | GPL EXPLOIT Microsoft cmd.exe banner | Successful Administrator Privilege Gain |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts