NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.194.8.143 Active Moloch
114.80.56.121 Active Moloch
146.75.92.193 Active Moloch
164.124.101.2 Active Moloch
51.15.65.182 Active Moloch
GET 200 https://i.imgur.com/pRZqSZX.png
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49163 -> 104.194.8.143:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49162 -> 114.80.56.121:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 146.75.92.193:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 104.194.8.143:443 -> 192.168.56.101:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49162
114.80.56.121:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=CN, ST=Shanghai, L=Shanghai, O=Shanghai Ctrip Commerce Co., Ltd., CN=*.ctrip.com 53:d0:92:1f:b9:1e:9f:7d:20:52:f2:94:de:2a:c2:44:45:3c:c2:62
TLSv1
192.168.56.101:49166
146.75.92.193:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.imgur.com d6:4d:45:03:6d:38:f8:fd:ea:af:e5:92:b3:4d:85:a5:6b:af:5c:ec

Snort Alerts

No Snort Alerts