NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.64.12 Active Moloch
119.176.27.237 Active Moloch
119.63.197.139 Active Moloch
124.156.105.121 Active Moloch
164.124.101.2 Active Moloch
198.54.117.242 Active Moloch
223.5.5.5 Active Moloch
23.225.34.75 Active Moloch
43.129.138.220 Active Moloch
GET 200 https://site.ip138.com/domain/read.do?domain=cdn.cuilet.com&time=1724129865281
REQUEST
RESPONSE
GET 200 https://ip.cn/api/index?ip=cdn.cuilet.com&type=1
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/API/General/client_log_user
REQUEST
RESPONSE
GET 200 http://apps.game.qq.com/comm-htdocs/ip/get_ip.php
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/API/General/lsrpu
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 404 http://cdn.sackow.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 404 http://cdn.sackow.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 404 http://cdn.sackow.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 404 http://cdn.sackow.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 404 http://cdn.sackow.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.qqb3.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.comhttp://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.comhttp://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.comhttp://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE
GET 200 http://cdn.cuilet.comhttp://cdn.cuilet.com/api/filegoto1/d76b29f56b8bed99
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49183 -> 124.156.105.121:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:57081 -> 164.124.101.2:53 2047079 ET INFO External IP Check Domain in DNS Lookup (ip .cn) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49184 -> 104.21.64.12:443 2047080 ET INFO Observed External IP Lookup Domain (ip .cn in TLS SNI) Device Retrieving External IP Address Detected
TCP 192.168.56.101:49184 -> 104.21.64.12:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.101:57082 -> 8.8.8.8:53 2047079 ET INFO External IP Check Domain in DNS Lookup (ip .cn) Device Retrieving External IP Address Detected
TCP 198.54.117.242:80 -> 192.168.56.101:49161 2527003 ET Threatview.io High Confidence Cobalt Strike C2 IP group 4 Misc Attack
TCP 192.168.56.101:49164 -> 119.63.197.139:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49183
124.156.105.121:443
C=BE, O=GlobalSign nv-sa, CN=AlphaSSL CA - SHA256 - G4 CN=site.ip138.com 1f:4a:7e:5a:dd:da:5b:38:e0:1d:40:26:d9:97:cc:dc:1c:db:bc:36
TLSv1
192.168.56.101:49184
104.21.64.12:443
C=US, O=Google Trust Services, CN=WE1 CN=ip.cn 15:f7:45:c7:89:82:91:c9:28:a1:91:a4:e0:c9:e1:00:f1:64:f3:a1
TLSv1
192.168.56.101:49164
119.63.197.139:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018 C=CN, ST=beijing, L=beijing, O=Beijing Baidu Netcom Science Technology Co., Ltd, CN=baidu.com ef:0f:be:13:02:e2:c4:d4:89:ba:8f:ba:88:ef:6f:95:dc:cf:7b:e0

Snort Alerts

No Snort Alerts