NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.21.49.12 Active Moloch
164.124.101.2 Active Moloch
192.3.101.146 Active Moloch
Name Response Post-Analysis Lookup
pastefy.app 104.21.49.12
GET 200 https://pastefy.app/SXZ0OaCN/raw
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49164 -> 104.21.49.12:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49164
104.21.49.12:443
C=US, O=Google Trust Services, CN=WE1 CN=pastefy.app b6:42:cb:7c:dc:26:c2:f9:e3:e9:9c:47:e7:84:60:7f:b5:bc:66:32

Snort Alerts

No Snort Alerts