NetWork | ZeroBOX

Network Analysis

IP Address Status Action
142.250.199.65 Active Moloch
164.124.101.2 Active Moloch
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
GET 404 https://huskidkifklaoksikfkfijsju.blogspot.com/atom.xml
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
GET 404 https://huskidkifklaoksikfkfijsju.blogspot.com/atom.xml
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
GET 404 https://huskidkifklaoksikfkfijsju.blogspot.com/atom.xml
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
OPTIONS 405 https://huskidkifklaoksikfkfijsju.blogspot.com/
REQUEST
RESPONSE
GET 404 https://huskidkifklaoksikfkfijsju.blogspot.com/atom.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49172 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49170 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49177 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49175 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49164 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49174 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49173 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49168 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49171 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49176 -> 142.250.199.65:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49165
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49172
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49170
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49166
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49177
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49175
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49164
142.250.199.65:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=misc-sni.blogspot.com 78:9f:da:34:a6:28:ba:26:5e:6f:1d:9f:e6:7d:3c:b2:53:7a:29:70
TLSv1
192.168.56.101:49174
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49173
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49163
142.250.199.65:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 CN=*.googleusercontent.com 1e:bf:42:27:86:d6:60:5e:34:a8:a7:bc:2c:ea:7e:78:19:df:f0:4b
TLSv1
192.168.56.101:49168
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49171
142.250.199.65:443
None None None
TLSv1
192.168.56.101:49176
142.250.199.65:443
None None None

Snort Alerts

No Snort Alerts