NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.235.70 Active Moloch
164.124.101.2 Active Moloch
172.67.198.249 Active Moloch
91.92.240.41 Active Moloch
GET 404 https://gcdnb.pbrd.co/images/6oHgYLgr6bK3.png?o=1
REQUEST
RESPONSE
GET 200 https://iili.io/JNYCwle.png
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 91.92.240.41:7575 -> 192.168.56.103:49162 2400012 ET DROP Spamhaus DROP Listed Traffic Inbound group 13 Misc Attack
TCP 192.168.56.103:49162 -> 172.67.198.249:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 104.21.235.70:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49162
172.67.198.249:443
C=US, O=Google Trust Services, CN=WE1 CN=pbrd.co 79:68:77:d6:5f:0e:f5:de:95:32:8b:ac:71:a4:7b:6d:21:61:a8:3f
TLSv1
192.168.56.103:49164
104.21.235.70:443
C=US, O=Google Trust Services, CN=WE1 CN=iili.io 8f:d4:58:59:55:6a:03:e7:74:8c:f7:04:b1:7d:6a:76:4a:67:63:27

Snort Alerts

No Snort Alerts