[Silicon Defense logo]

SnortSnarf alert page

Source: 24.59.74.47

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

17 such alerts found using input module SnortFileInput, with sources:
Earliest: 06:28:00.607793 on 06/08/2003
Latest: 06:28:57.013228 on 06/08/2003

6 different signatures are present for 24.59.74.47 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.59.74.47 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:00.607793 24.59.74.47:3827 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:11489 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x379A4F29 Ack: 0x2AACBC0A Win: 0xB5C9 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:01.043838 24.59.74.47:3834 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:11552 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x37A0A6AE Ack: 0x2A9F17FC Win: 0xB5C9 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:10.553622 24.59.74.47:4131 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:13110 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x38A153CF Ack: 0x2B9779E6 Win: 0xB5C9 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:20.047217 24.59.74.47:4440 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14681 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x39A861FD Ack: 0x2BDBE992 Win: 0xB5C9 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:20.224759 24.59.74.47:4447 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14713 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x39AEC661 Ack: 0x2C57D1E2 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
06/08-06:28:20.482894 24.59.74.47:4461 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14777 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x39BA3E72 Ack: 0x2C0E1961 Win: 0xB5C9 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
06/08-06:28:20.761612 24.59.74.47:4473 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14851 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x39C4121B Ack: 0x2CBE258A Win: 0xB5C9 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:20.991511 24.59.74.47:4479 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14907 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x39C94CD9 Ack: 0x2BCCE501 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:21.189511 24.59.74.47:4488 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:14959 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x39D0C71B Ack: 0x2C444BDD Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:30.838612 24.59.74.47:4840 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:16782 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x3AFB4F9C Ack: 0x2C870B97 Win: 0xB5C9 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:40.271095 24.59.74.47:1195 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:18535 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x3C0B6F5D Ack: 0x2DDC212E Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:40.462514 24.59.74.47:1209 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:18579 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x3C1547C8 Ack: 0x2CF911BF Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:53.329416 24.59.74.47:1527 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:20912 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x3D2211B7 Ack: 0x2E13D9F0 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:53.585739 24.59.74.47:1641 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:20989 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x3D8252A1 Ack: 0x2E0A3513 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:56.470279 24.59.74.47:1641 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:21472 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x3D8252A1 Ack: 0x2E0A3513 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:56.846394 24.59.74.47:1753 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:21545 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x3DDFFBF6 Ack: 0x2EB1D9E4 Win: 0xB5C9 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/08-06:28:57.013228 24.59.74.47:1756 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:21575 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x3DE2FB20 Ack: 0x2E671FB4 Win: 0xB5C9 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:53 2003