Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
api.ipify.org | 104.26.13.205 | |
ftp.concaribe.com |
CNAME
concaribe.com
|
192.185.13.234 |
GET
200
https://api.ipify.org/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Host: api.ipify.org
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 17 Mar 2025 01:08:58 GMT
Content-Type: text/plain
Content-Length: 13
Connection: keep-alive
Vary: Origin
cf-cache-status: DYNAMIC
Server: cloudflare
CF-RAY: 92189a27bc1ffcd3-FUK
server-timing: cfL4;desc="?proto=TCP&rtt=26255&min_rtt=11919&rtt_var=31625&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2827&recv_bytes=465&delivery_rate=244986&cwnd=252&unsent_bytes=0&cid=7a900719e061e024&ts=397&x=0"
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2047702 | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup | Misc activity |
TCP 192.185.13.234:21 -> 192.168.56.103:49166 | 2260002 | SURICATA Applayer Detect protocol only one direction | Generic Protocol Command Decode |
TCP 192.168.56.103:49165 -> 172.67.74.152:443 | 2047703 | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI | Misc activity |
TCP 192.168.56.103:49165 -> 172.67.74.152:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49165 172.67.74.152:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=ipify.org | bd:fd:0e:47:c4:8e:87:56:19:5e:86:99:5b:45:32:c3:13:aa:aa:f3 |
Snort Alerts
No Snort Alerts