NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.20.3.235 Active Moloch
147.45.44.138 Active Moloch
164.124.101.2 Active Moloch
Name Response Post-Analysis Lookup
pastebin.com 104.20.4.235
GET 200 https://pastebin.com/raw/jDAt5ZME
REQUEST
RESPONSE
GET 200 https://pastebin.com/raw/jDAt5ZME
REQUEST
RESPONSE
GET 200 https://pastebin.com/raw/jDAt5ZME
REQUEST
RESPONSE
GET 200 https://pastebin.com/raw/jDAt5ZME
REQUEST
RESPONSE
GET 200 https://pastebin.com/raw/jDAt5ZME
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 147.45.44.138:8848 -> 192.168.56.103:49168 2400022 ET DROP Spamhaus DROP Listed Traffic Inbound group 23 Misc Attack
TCP 192.168.56.103:49165 -> 104.20.3.235:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49165
104.20.3.235:443
C=US, O=Google Trust Services, CN=WR1 CN=pastebin.com cc:0e:be:70:1b:67:5c:13:ea:80:6e:13:9c:74:c6:a7:8e:99:11:11

Snort Alerts

No Snort Alerts