NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.16.231.132 Active Moloch
117.18.232.200 Active Moloch
164.124.101.2 Active Moloch
GET 200 https://varied-flux-emails-grounds.trycloudflare.com/a.pdf
REQUEST
RESPONSE
GET 200 https://varied-flux-emails-grounds.trycloudflare.com/b.pdf
REQUEST
RESPONSE
GET 200 http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2034552 ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com) Potentially Bad Traffic
TCP 192.168.56.101:49170 -> 104.16.231.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49169 -> 104.16.231.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49182 -> 104.16.231.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49183 -> 104.16.231.132:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49170
104.16.231.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com 14:e5:5a:7a:3b:34:3a:c0:b2:af:48:86:76:27:89:d3:a5:3a:95:65
TLSv1
192.168.56.101:49169
104.16.231.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com 14:e5:5a:7a:3b:34:3a:c0:b2:af:48:86:76:27:89:d3:a5:3a:95:65
TLSv1
192.168.56.101:49183
104.16.231.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com 14:e5:5a:7a:3b:34:3a:c0:b2:af:48:86:76:27:89:d3:a5:3a:95:65
TLSv1
192.168.56.101:49182
104.16.231.132:443
C=US, O=Google Trust Services, CN=WR1 CN=trycloudflare.com 14:e5:5a:7a:3b:34:3a:c0:b2:af:48:86:76:27:89:d3:a5:3a:95:65

Snort Alerts

No Snort Alerts