Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
pastebin.com | 104.20.67.143 |
- TCP Requests
GET
200
https://pastebin.com/raw/A54sKxhY
REQUEST
RESPONSE
BODY
GET /raw/A54sKxhY HTTP/1.1
Host: pastebin.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 01 Dec 2023 01:41:30 GMT
Content-Type: text/plain; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
cache-control: public, max-age=1801
CF-Cache-Status: HIT
Age: 1280
Last-Modified: Fri, 01 Dec 2023 01:20:10 GMT
Server: cloudflare
CF-RAY: 82e7a0d2edcb7ea2-LAX
GET
200
https://pastebin.com/raw/A54sKxhY
REQUEST
RESPONSE
BODY
GET /raw/A54sKxhY HTTP/1.1
Host: pastebin.com
HTTP/1.1 200 OK
Date: Fri, 01 Dec 2023 01:42:02 GMT
Content-Type: text/plain; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
cache-control: public, max-age=1801
CF-Cache-Status: HIT
Age: 1312
Last-Modified: Fri, 01 Dec 2023 01:20:10 GMT
Server: cloudflare
CF-RAY: 82e7a19a292a7ea2-LAX
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49166 -> 104.20.68.143:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49166 104.20.68.143:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 55:c8:82:61:30:05:42:80:db:47:5e:d0:66:b5:df:ac:14:5b:19:6f |
Snort Alerts
No Snort Alerts