Windows
Analysis Report
https://rdap.arin.net/registry/ip/104.193.88.0
Overview
General Information
Detection
Score: | 1 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
chrome.exe (PID: 1440 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" --sta rt-maximiz ed "about: blank MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 3472 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2376 --fi eld-trial- handle=222 4,i,877919 2040810359 767,118446 9157795890 3530,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
chrome.exe (PID: 4448 cmdline:
C:\Program Files\Goo gle\Chrome \Applicati on\chrome. exe" "http s://rdap.a rin.net/re gistry/ip/ 104.193.88 .0 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
- • Phishing
- • Compliance
- • Networking
- • System Summary
- • Boot Survival
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: | ||
Source: | LNK file: |
Source: | Window detected: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 1 Process Injection | 11 Masquerading | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 1 Process Injection | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 4 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 5 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
accounts.google.com | 74.125.136.84 | true | false | high | |
www.google.com | 172.217.215.104 | true | false | high | |
clients.l.google.com | 142.250.9.101 | true | false | high | |
rdap.arin.net | 199.71.0.160 | true | false | high | |
fp2e7a.wpc.phicdn.net | 192.229.211.108 | true | false | unknown | |
windowsupdatebg.s.llnwi.net | 69.164.42.0 | true | false | unknown | |
clients1.google.com | unknown | unknown | false | high | |
clients2.google.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
74.125.136.84 | accounts.google.com | United States | 15169 | GOOGLEUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.215.104 | www.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.9.101 | clients.l.google.com | United States | 15169 | GOOGLEUS | false | |
199.71.0.160 | rdap.arin.net | United States | 393220 | ARIN-PFS-SJCUS | false |
IP |
---|
192.168.2.22 |
192.168.2.4 |
192.168.2.5 |
Joe Sandbox version: | 39.0.0 Ruby |
Analysis ID: | 1387159 |
Start date and time: | 2024-02-05 22:59:56 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 17s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | browseurl.jbs |
Sample URL: | https://rdap.arin.net/registry/ip/104.193.88.0 |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean1.win@16/10@10/8 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, WM IADAP.exe, SIHClient.exe, svch ost.exe - Excluded IPs from analysis (wh
itelisted): 142.250.105.94, 34 .104.35.123, 20.114.59.183, 19 2.229.211.108, 23.40.205.11, 2 3.40.205.49, 23.40.205.35, 23. 40.205.18, 23.40.205.73, 23.40 .205.26, 23.40.205.81, 23.40.2 05.56, 23.40.205.34, 20.3.187. 198, 72.21.81.240, 64.233.176. 94, 69.164.42.0 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , wu.ec.azureedge.net, clients ervices.googleapis.com, ctldl. windowsupdate.com, a767.dspw65 .akamai.net, wu-bg-shim.traffi cmanager.net, wu.azureedge.net , download.windowsupdate.com.e dgesuite.net, fe3cr.delivery.m p.microsoft.com, fe3.delivery. mp.microsoft.com, edgedl.me.gv t1.com, ocsp.digicert.com, ocs p.edge.digicert.com, glb.cws.p rod.dcat.dsp.trafficmanager.ne t, bg.apr-52dd2-0503.edgecastd ns.net, cs11.wpc.v0cdn.net, sl s.update.microsoft.com, hlb.ap r-52dd2-0.edgecastdns.net, upd ate.googleapis.com, glb.sls.pr od.dcat.dsp.trafficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenFile calls found . - Report size getting too big, t
oo many NtSetInformationFile c alls found. - VT rate limit hit for: https:
//rdap.arin.net/registry/ip/10 4.193.88.0
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.978621720308257 |
Encrypted: | false |
SSDEEP: | 48:8CdjTLLjHBidAKZdA19ehwiZUklqehSy+3:8a7nFy |
MD5: | 55F8D65FEF1D9823C72D089C346F4531 |
SHA1: | 888EA592AC55BC2F9973241291A78BC066D6AB6D |
SHA-256: | 53A6AB933C916801732362E40B5F019A0D0EFA995760A4FCA5D60C0D6904C14F |
SHA-512: | E1717CEDC52DADCF02C50B573DE11312E47F8CB80EE4A07862243D322EC37B5A30DA048C9513A5594614634F564DDD1AA5EBC10277C5BBB5168772CCF8B8A34C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9952038013301756 |
Encrypted: | false |
SSDEEP: | 48:8qdjTLLjHBidAKZdA1weh/iZUkAQkqeh1y+2:8S7N9QQy |
MD5: | BCFF6DE34613BCF392932104CED8E065 |
SHA1: | A3BA80E4A166375302888B65669A9C2DD18F9597 |
SHA-256: | A06E205CC1576BC9D93BCC0FE226E0CEA304462978FC227F69677FCB985FCC73 |
SHA-512: | 8B3ADD48CD4440CA6C1290751081054ED2379DD6308384B8EE0011FDE3718C5F47A7566FFC98DB4FA0A03D8B0F071A1BBEBE8D858B35943F2E15A30A510707A2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.005519080323737 |
Encrypted: | false |
SSDEEP: | 48:8xkdjTLLsHBidAKZdA14tseh7sFiZUkmgqeh7sry+BX:8xM7Qnxy |
MD5: | F971FFBC19A0497977F15FCFB62C510A |
SHA1: | 26ED67ED0410E60990CD9FA6BAD167D5D2FD6F9E |
SHA-256: | B1B6DF91F91AA95DCC824274C83B8A33C954D81598848718847EFE72DEEEBD42 |
SHA-512: | 9511EED83924947FD603AAACA23B36E8088514C1C952F1D97D211AE74FFD21C3558F825F8FE6229FC9D93DE01355E1CD6542DD61FB071B0549944EE675ABAA29 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9923422306395264 |
Encrypted: | false |
SSDEEP: | 48:8mdjTLLjHBidAKZdA1vehDiZUkwqehJy+R:827ujy |
MD5: | 4348682793C2233802980B98FC0C41B8 |
SHA1: | D5B7242967A0C6A4901B0783CE4ED4EB59C515FF |
SHA-256: | FA79DBBF21B6AF973A6D26299AD71FD26802199AB90BE502894AFE1A7C7A563A |
SHA-512: | 2A197316C49B660C303A5127B5B4339D7D2C438CCF67E13B89E27BD6D1E5633F30250A9C54ECB3BFA0E00DCF9ABBBBD3FECF01C610487FECFC03110AE7C81E6C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9816650401268667 |
Encrypted: | false |
SSDEEP: | 48:8YdjTLLjHBidAKZdA1hehBiZUk1W1qehHy+C:8I7e9ny |
MD5: | 88578E9E97A3D8246C41CF1E45E0CF09 |
SHA1: | 943921AA2246C4570C682CA7B7BB97781E036989 |
SHA-256: | F83C8A070A66E4A322F1AC5B0AB37CEF189468300244E824838D34CE481268D8 |
SHA-512: | C232F69E6B011D0B97D6B7E0AA464E06B8D4E086496F400F96A644AA2CDFF576178C4D434F26A20B8111FC112615677CA535D5B108EFBA58A13D7B55739F48BD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 3.9910554228598483 |
Encrypted: | false |
SSDEEP: | 48:89djTLLjHBidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbxy+yT+:8z7AT/TbxWOvTbxy7T |
MD5: | C157F263B8316AE214867D6B18493BE2 |
SHA1: | CAD40FBC985851E448FA3C64E307E50896430F52 |
SHA-256: | D4C960A755BF0686FE134EC25C45BB5DBC5AEAE531F606FB1EE1653B904C224F |
SHA-512: | EACF440D205862D723DF78BC4D38F577EFB4D9410A54F9223C4F8FB6DB80748AF2322B2861DE2D45330E000CF906A71ED8D04B5400FFF6482C786E662A5D6C8A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6309 |
Entropy (8bit): | 4.775173465973005 |
Encrypted: | false |
SSDEEP: | 192:HPr57/n0r/irYXvvOwXJRWbWYhJuRWVLnrM:vr5T0r/irYfWwZUb9XMk4 |
MD5: | 45148B83F0FF24AC36F4A5AD4455EABB |
SHA1: | BBDB4F0A21AF558AEE437B61873C421C467666D2 |
SHA-256: | 18E51F5B22E15FA49ABB49DDA1A46D6EDC74A3DBC1873EC457905C9FCDB6305D |
SHA-512: | 9A3C2616290ED0066B3DC3AC6A075A4CA9EC2ABA1739016C4F25FE6CFDFFCAED8222FA4198ED0D3D4F16A29AA5C19ACD18EEC01E8D2AE677689F56BC65DD13BF |
Malicious: | false |
Reputation: | low |
URL: | https://rdap.arin.net/registry/ip/104.193.88.0 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 209 |
Entropy (8bit): | 5.143049113812332 |
Encrypted: | false |
SSDEEP: | 6:pn0+Dy9xwGObRmEr6VnetdzRx3ezJLM4KCezocKqD:J0+oxBeRmR9etdzRxy17ez1T |
MD5: | 18FFB59B61525F781CF9251045BE575D |
SHA1: | BD7318B00B15B7A1C8A48524419FA2E5C27A5B6D |
SHA-256: | B6682CAB65D3243B5B75EFB7279DBF49491957484780F2BA0A87632CC0E25642 |
SHA-512: | A032F853ABD9492232E1183D1CB1D14110B623F2E9DEC56B7B64DD576A0317DDA8D51125763E11D6642433C5364B2BD10A994EE4F1514629A4950BBAB3ABA499 |
Malicious: | false |
Reputation: | low |
URL: | https://rdap.arin.net/favicon.ico |
Preview: |
Download Network PCAP: filtered – full
- Total Packets: 117
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 5, 2024 23:00:44.203133106 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:44.203263998 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:44.312501907 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:52.570492029 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.570502043 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.570547104 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.571408033 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.571444035 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.571496010 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.572490931 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.572500944 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.572772026 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.572784901 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.811801910 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.812165976 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.812199116 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.813695908 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.813770056 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.817337036 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.817449093 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.817966938 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:52.817981005 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:52.831286907 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.831490993 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.831500053 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.831875086 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.831943989 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.832586050 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.832645893 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.833672047 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.833734035 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.833832026 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:52.833837032 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:52.873120070 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:53.027756929 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:53.028134108 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:53.028202057 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:53.028940916 CET | 49707 | 443 | 192.168.2.5 | 74.125.136.84 |
Feb 5, 2024 23:00:53.028964043 CET | 443 | 49707 | 74.125.136.84 | 192.168.2.5 |
Feb 5, 2024 23:00:53.037913084 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:53.037956953 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:53.066122055 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:53.066277981 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:53.066335917 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:53.067178011 CET | 49706 | 443 | 192.168.2.5 | 142.250.9.101 |
Feb 5, 2024 23:00:53.067198038 CET | 443 | 49706 | 142.250.9.101 | 192.168.2.5 |
Feb 5, 2024 23:00:53.809056044 CET | 49675 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:53.871656895 CET | 49674 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:53.918508053 CET | 49673 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:54.737797022 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.737853050 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:54.737926006 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.738857031 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.738903999 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:54.738975048 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.740139008 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.740153074 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:54.740407944 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:54.740433931 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.084306955 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.084803104 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.084866047 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.086148024 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.086220026 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.086268902 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.087474108 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.087507010 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.088665009 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.088777065 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.088871956 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.088891029 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.088960886 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.089015007 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.090009928 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.090104103 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.130032063 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.130034924 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.130059958 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.177122116 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.274774075 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:00:55.274945974 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:00:55.403692007 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.403719902 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.403763056 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.403800964 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.403836966 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.403877020 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.560342073 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.560475111 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.560507059 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.560529947 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.560569048 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.571126938 CET | 49710 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.571146965 CET | 443 | 49710 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.657883883 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.705904961 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.815926075 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.816040039 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:55.816088915 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.825896978 CET | 49711 | 443 | 192.168.2.5 | 199.71.0.160 |
Feb 5, 2024 23:00:55.825918913 CET | 443 | 49711 | 199.71.0.160 | 192.168.2.5 |
Feb 5, 2024 23:00:57.140295982 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.140331030 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.140459061 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.144556046 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.144567013 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.360120058 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.368071079 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.368083954 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.369144917 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.369210005 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.374834061 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.374910116 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.418497086 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.418504953 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:00:57.465755939 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:00:57.623750925 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:57.623800993 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:57.623872042 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:57.642627001 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:57.642651081 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:57.856183052 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:57.856266975 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:57.906029940 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:57.906060934 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:57.906445980 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:57.950140953 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.371349096 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.413899899 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.473815918 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.473927021 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.473980904 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.474076986 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.474092007 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.474107027 CET | 49715 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.474113941 CET | 443 | 49715 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.545224905 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.545250893 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.545320988 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.546102047 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.546113014 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.755935907 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.756526947 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.761555910 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.761564016 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.761954069 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:58.771413088 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:58.817892075 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:59.065800905 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:59.065989971 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:59.068382025 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:59.072657108 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:59.072690964 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:00:59.072735071 CET | 49716 | 443 | 192.168.2.5 | 23.63.206.91 |
Feb 5, 2024 23:00:59.072745085 CET | 443 | 49716 | 23.63.206.91 | 192.168.2.5 |
Feb 5, 2024 23:01:05.622488976 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:05.622922897 CET | 49703 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:05.625989914 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:05.626033068 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:05.626138926 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:05.628351927 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:05.628386021 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:05.771359921 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:05.771785021 CET | 443 | 49703 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.004352093 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.004439116 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.088519096 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.088556051 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.088989973 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.089046001 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.089801073 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.089835882 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.090006113 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.090013981 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.336718082 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.336781025 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.337044954 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:06.337094069 CET | 443 | 49722 | 23.1.237.91 | 192.168.2.5 |
Feb 5, 2024 23:01:06.337146044 CET | 49722 | 443 | 192.168.2.5 | 23.1.237.91 |
Feb 5, 2024 23:01:07.359539986 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:07.359611034 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:07.359752893 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:08.795764923 CET | 49714 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:08.795789957 CET | 443 | 49714 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.301593065 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.301628113 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.301743984 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.302373886 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.302392960 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.514194965 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.559552908 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.714942932 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.714951038 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.715526104 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.740323067 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:01:57.740458012 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:01:57.786823988 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:02:07.527103901 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:02:07.527184010 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:02:07.527396917 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:02:08.853252888 CET | 49727 | 443 | 192.168.2.5 | 172.217.215.104 |
Feb 5, 2024 23:02:08.853287935 CET | 443 | 49727 | 172.217.215.104 | 192.168.2.5 |
Feb 5, 2024 23:02:21.805368900 CET | 49730 | 443 | 192.168.2.5 | 64.233.176.138 |
Feb 5, 2024 23:02:21.805414915 CET | 443 | 49730 | 64.233.176.138 | 192.168.2.5 |
Feb 5, 2024 23:02:21.805485010 CET | 49730 | 443 | 192.168.2.5 | 64.233.176.138 |
Feb 5, 2024 23:02:21.805845976 CET | 49730 | 443 | 192.168.2.5 | 64.233.176.138 |
Feb 5, 2024 23:02:21.805860996 CET | 443 | 49730 | 64.233.176.138 | 192.168.2.5 |
Feb 5, 2024 23:02:22.016267061 CET | 443 | 49730 | 64.233.176.138 | 192.168.2.5 |
Feb 5, 2024 23:02:22.059557915 CET | 49730 | 443 | 192.168.2.5 | 64.233.176.138 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 5, 2024 23:00:52.389679909 CET | 64330 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:52.390072107 CET | 53580 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:52.390630007 CET | 51540 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:52.392591953 CET | 60043 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:52.507205963 CET | 53 | 64330 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:52.507356882 CET | 53 | 53580 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:52.508138895 CET | 53 | 51540 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:52.509696007 CET | 53 | 60043 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:52.553636074 CET | 53 | 59061 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:53.242913008 CET | 53 | 55039 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:54.549345970 CET | 58710 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:54.552025080 CET | 49661 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:54.669578075 CET | 53 | 58710 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:54.740474939 CET | 53 | 49661 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:57.018596888 CET | 59206 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:57.019720078 CET | 53257 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:00:57.135848045 CET | 53 | 59206 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:00:57.137013912 CET | 53 | 53257 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:01:10.336647034 CET | 53 | 57326 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:01:29.735019922 CET | 53 | 50435 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:01:52.498581886 CET | 53 | 63670 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:01:52.512867928 CET | 53 | 64813 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:02:20.896758080 CET | 53 | 59170 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:02:21.686548948 CET | 54701 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:02:21.686654091 CET | 53407 | 53 | 192.168.2.5 | 1.1.1.1 |
Feb 5, 2024 23:02:21.803836107 CET | 53 | 54701 | 1.1.1.1 | 192.168.2.5 |
Feb 5, 2024 23:02:21.804809093 CET | 53 | 53407 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Feb 5, 2024 23:00:54.740545988 CET | 192.168.2.5 | 1.1.1.1 | c211 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 5, 2024 23:00:52.389679909 CET | 192.168.2.5 | 1.1.1.1 | 0x4b7a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 5, 2024 23:00:52.390072107 CET | 192.168.2.5 | 1.1.1.1 | 0x7083 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 5, 2024 23:00:52.390630007 CET | 192.168.2.5 | 1.1.1.1 | 0xa6b4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 5, 2024 23:00:52.392591953 CET | 192.168.2.5 | 1.1.1.1 | 0x1e79 | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 5, 2024 23:00:54.549345970 CET | 192.168.2.5 | 1.1.1.1 | 0x6cca | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 5, 2024 23:00:54.552025080 CET | 192.168.2.5 | 1.1.1.1 | 0x5b7c | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 5, 2024 23:00:57.018596888 CET | 192.168.2.5 | 1.1.1.1 | 0xe1b4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 5, 2024 23:00:57.019720078 CET | 192.168.2.5 | 1.1.1.1 | 0x253e | Standard query (0) | 65 | IN (0x0001) | false | |
Feb 5, 2024 23:02:21.686548948 CET | 192.168.2.5 | 1.1.1.1 | 0x9929 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 5, 2024 23:02:21.686654091 CET | 192.168.2.5 | 1.1.1.1 | 0xe21c | Standard query (0) | 65 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 5, 2024 23:00:52.507205963 CET | 1.1.1.1 | 192.168.2.5 | 0x4b7a | No error (0) | 74.125.136.84 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.101 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.100 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.139 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.113 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.102 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.508138895 CET | 1.1.1.1 | 192.168.2.5 | 0xa6b4 | No error (0) | 142.250.9.138 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:52.509696007 CET | 1.1.1.1 | 192.168.2.5 | 0x1e79 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:54.669578075 CET | 1.1.1.1 | 192.168.2.5 | 0x6cca | No error (0) | 199.71.0.160 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:54.669578075 CET | 1.1.1.1 | 192.168.2.5 | 0x6cca | No error (0) | 199.212.0.160 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:54.669578075 CET | 1.1.1.1 | 192.168.2.5 | 0x6cca | No error (0) | 199.5.26.160 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.104 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.147 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.103 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.106 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.99 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.135848045 CET | 1.1.1.1 | 192.168.2.5 | 0xe1b4 | No error (0) | 172.217.215.105 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:00:57.137013912 CET | 1.1.1.1 | 192.168.2.5 | 0x253e | No error (0) | 65 | IN (0x0001) | false | |||
Feb 5, 2024 23:01:05.053595066 CET | 1.1.1.1 | 192.168.2.5 | 0xbf70 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 5, 2024 23:01:05.053595066 CET | 1.1.1.1 | 192.168.2.5 | 0xbf70 | No error (0) | 192.229.211.108 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:06.437328100 CET | 1.1.1.1 | 192.168.2.5 | 0x9494 | No error (0) | 69.164.42.0 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.138 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.102 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.113 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.100 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.101 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.803836107 CET | 1.1.1.1 | 192.168.2.5 | 0x9929 | No error (0) | 64.233.176.139 | A (IP address) | IN (0x0001) | false | ||
Feb 5, 2024 23:02:21.804809093 CET | 1.1.1.1 | 192.168.2.5 | 0xe21c | No error (0) | clients.l.google.com | CNAME (Canonical name) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49707 | 74.125.136.84 | 443 | 3472 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:52 UTC | 680 | OUT | |
2024-02-05 22:00:52 UTC | 1 | OUT | |
2024-02-05 22:00:53 UTC | 1799 | IN | |
2024-02-05 22:00:53 UTC | 23 | IN | |
2024-02-05 22:00:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 142.250.9.101 | 443 | 3472 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:52 UTC | 752 | OUT | |
2024-02-05 22:00:53 UTC | 732 | IN | |
2024-02-05 22:00:53 UTC | 520 | IN | |
2024-02-05 22:00:53 UTC | 200 | IN | |
2024-02-05 22:00:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49710 | 199.71.0.160 | 443 | 3472 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:55 UTC | 680 | OUT | |
2024-02-05 22:00:55 UTC | 215 | IN | |
2024-02-05 22:00:55 UTC | 2333 | IN | |
2024-02-05 22:00:55 UTC | 1274 | IN | |
2024-02-05 22:00:55 UTC | 2548 | IN | |
2024-02-05 22:00:55 UTC | 154 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49711 | 199.71.0.160 | 443 | 3472 | C:\Program Files\Google\Chrome\Application\chrome.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:55 UTC | 606 | OUT | |
2024-02-05 22:00:55 UTC | 199 | IN | |
2024-02-05 22:00:55 UTC | 209 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49715 | 23.63.206.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:58 UTC | 161 | OUT | |
2024-02-05 22:00:58 UTC | 532 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49716 | 23.63.206.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:00:58 UTC | 239 | OUT | |
2024-02-05 22:00:59 UTC | 661 | IN | |
2024-02-05 22:00:59 UTC | 55 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
6 | 192.168.2.5 | 49722 | 23.1.237.91 | 443 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-02-05 22:01:06 UTC | 2148 | OUT | |
2024-02-05 22:01:06 UTC | 1 | OUT | |
2024-02-05 22:01:06 UTC | 2483 | OUT | |
2024-02-05 22:01:06 UTC | 475 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 23:00:46 |
Start date: | 05/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 23:00:50 |
Start date: | 05/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 23:00:53 |
Start date: | 05/02/2024 |
Path: | C:\Program Files\Google\Chrome\Application\chrome.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff715980000 |
File size: | 3'242'272 bytes |
MD5 hash: | 45DE480806D1B5D462A7DDE4DCEFC4E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |