NetWork | ZeroBOX

Network Analysis

IP Address Status Action
162.221.189.194 Active Moloch
164.124.101.2 Active Moloch
23.67.53.18 Active Moloch
64.185.227.156 Active Moloch
GET 200 http://apps.identrust.com/roots/dstrootcax3.p7c
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 64.185.227.156:443 -> 192.168.56.103:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 162.221.189.194:587 -> 192.168.56.103:49166 2260002 SURICATA Applayer Detect protocol only one direction Generic Protocol Command Decode
TCP 192.168.56.103:49165 -> 64.185.227.156:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 162.221.189.194:587 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49166
162.221.189.194:587
C=US, O=Let's Encrypt, CN=R3 CN=*.timextradingplc.com 65:62:bb:2f:d0:8d:d0:59:39:56:e6:51:4f:7c:55:4a:0f:87:f6:54

Snort Alerts

No Snort Alerts