Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
madibarohillathree.duckdns.org | 103.183.115.144 | |
onedrive.live.com |
CNAME
web.fe.1drv.com
|
13.107.139.11 |
- UDP Requests
-
-
192.168.56.102:62846 164.124.101.2:53
-
192.168.56.102:63709 164.124.101.2:53
-
192.168.56.102:64513 164.124.101.2:53
-
192.168.56.102:137 192.168.56.103:137
-
192.168.56.102:137 192.168.56.255:137
-
192.168.56.102:138 192.168.56.255:138
-
192.168.56.102:49152 239.255.255.250:3702
-
192.168.56.102:62849 239.255.255.250:1900
-
52.231.114.183:123 192.168.56.102:123
-
GET
200
http://madibarohillathree.duckdns.org/osa/233_Bihmbribbjz
REQUEST
RESPONSE
BODY
GET /osa/233_Bihmbribbjz HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: madibarohillathree.duckdns.org
HTTP/1.1 200 OK
Date: Fri, 31 May 2024 01:01:34 GMT
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
Last-Modified: Wed, 29 May 2024 01:03:40 GMT
ETag: "110efc-6198d522f1a76"
Accept-Ranges: bytes
Content-Length: 1117948
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49204 -> 103.183.115.144:80 | 2042937 | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.102:49207 -> 13.107.139.11:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts