[Silicon Defense logo]

SnortSnarf alert page

Source: 12.148.209.198

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

5 such alerts found using input module SnortFileInput, with sources:
Earliest: 20:32:42.269364 on 04/29/2003
Latest: 09:45:34.760628 on 05/24/2003

1 different signatures are present for 12.148.209.198 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

12.148.209.198 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1852:3] WEB-MISC robots.txt access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/29-20:32:42.269364 12.148.209.198:64444 -> 192.168.1.6:80
TCP TTL:47 TOS:0x0 ID:5110 IpLen:20 DgmLen:256 DF
***AP*** Seq: 0x34EF7298 Ack: 0x1A91B502 Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 184776565 970248711
[Xref => http://cgi.nessus.org/plugins/dump.php3?id=10302]
[**] [1:1852:3] WEB-MISC robots.txt access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/04-10:37:08.472124 12.148.209.198:65502 -> 192.168.1.6:80
TCP TTL:47 TOS:0x0 ID:55797 IpLen:20 DgmLen:256 DF
***AP*** Seq: 0x67DB17F3 Ack: 0x8F36C3C1 Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 224399758 1173204446
[Xref => http://cgi.nessus.org/plugins/dump.php3?id=10302]
[**] [1:1852:3] WEB-MISC robots.txt access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/16-05:07:03.383466 12.148.209.198:59906 -> 192.168.1.6:80
TCP TTL:48 TOS:0x0 ID:34332 IpLen:20 DgmLen:256 DF
***AP*** Seq: 0xA22F282F Ack: 0xAD0248FA Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 326091478 1694084267
[Xref => http://cgi.nessus.org/plugins/dump.php3?id=10302]
[**] [1:1852:3] WEB-MISC robots.txt access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/16-05:07:03.679184 12.148.209.198:59906 -> 192.168.1.6:80
TCP TTL:48 TOS:0x0 ID:34333 IpLen:20 DgmLen:256 DF
***AP*** Seq: 0xA22F282F Ack: 0xAD0248FA Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 326091508 1694084267
[Xref => http://cgi.nessus.org/plugins/dump.php3?id=10302]
[**] [1:1852:3] WEB-MISC robots.txt access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/24-09:45:34.760628 12.148.209.198:14979 -> 192.168.1.6:80
TCP TTL:49 TOS:0x0 ID:50655 IpLen:20 DgmLen:252 DF
***AP*** Seq: 0xBD212905 Ack: 0x59853B68 Win: 0x16D0 TcpLen: 32
TCP Options (3) => NOP NOP TS: 396877962 2056662944
[Xref => http://cgi.nessus.org/plugins/dump.php3?id=10302]

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003