Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
fronpeatcam.publicvm.com | 45.12.253.94 | |
ip-api.com | 208.95.112.1 | |
qpurrybeatmecamtest.ddns.net | 45.12.253.94 |
GET
200
http://ip-api.com/json/
REQUEST
RESPONSE
BODY
GET /json/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 22:53:59 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 272
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
GET
200
http://ip-api.com/json/
REQUEST
RESPONSE
BODY
GET /json/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Wed, 04 Oct 2023 22:54:57 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 272
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49172 -> 208.95.112.1:80 | 2036383 | ET MALWARE Common RAT Connectivity Check Observed | A Network Trojan was detected |
TCP 192.168.56.103:49172 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
TCP 192.168.56.103:49166 -> 208.95.112.1:80 | 2036383 | ET MALWARE Common RAT Connectivity Check Observed | A Network Trojan was detected |
TCP 192.168.56.103:49166 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
UDP 192.168.56.103:64894 -> 164.124.101.2:53 | 2034457 | ET POLICY Observed DNS Query to DynDNS Domain (publicvm .com) | Potentially Bad Traffic |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2028675 | ET POLICY DNS Query to DynDNS Domain *.ddns .net | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts