[Silicon Defense logo]

SnortSnarf alert page

Source: 24.98.22.117

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

25 such alerts found using input module SnortFileInput, with sources:
Earliest: 04:02:27.366918 on 05/07/2003
Latest: 04:25:38.395559 on 05/09/2003

6 different signatures are present for 24.98.22.117 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.98.22.117 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:27.366918 24.98.22.117:3587 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:16666 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x8CB64D5D Ack: 0x7A37AF52 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:28.060328 24.98.22.117:3688 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:16827 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x8D021B6C Ack: 0x7B00C6EB Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:28.341857 24.98.22.117:3697 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:16863 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x8D087BCB Ack: 0x7B328B66 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:38.106433 24.98.22.117:3998 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:18119 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x8E0979DE Ack: 0x7BA57C2D Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:39.036019 24.98.22.117:4087 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:18166 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x8E4D8536 Ack: 0x7B4687D5 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/07-04:02:51.904691 24.98.22.117:4467 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:19762 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x8F8E4183 Ack: 0x7C4C4FE6 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/07-04:02:55.365836 24.98.22.117:4574 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:20147 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x8FEB1001 Ack: 0x7C7BEC14 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:55.939711 24.98.22.117:4807 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:20278 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x906746DF Ack: 0x7BF6A980 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/07-04:02:56.457822 24.98.22.117:4856 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:20329 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x9075CD38 Ack: 0x7CE60C0A Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:24:37.107324 24.98.22.117:3092 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:31817 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xCF5F8222 Ack: 0x4DEB066E Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:24:42.364204 24.98.22.117:3170 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:32246 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xCFAD6167 Ack: 0x4E3DB34D Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:24:46.213461 24.98.22.117:3182 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:32546 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xCFB8EE24 Ack: 0x4EEB02E7 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:24:47.044562 24.98.22.117:3239 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:32607 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xCFECD2D6 Ack: 0x4F52126D Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:24:56.846516 24.98.22.117:3381 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:33346 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xD07A9D9A Ack: 0x501C606C Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/09-04:24:57.506199 24.98.22.117:3388 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:33411 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xD082A059 Ack: 0x5075DD0C Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/09-04:25:01.627037 24.98.22.117:3444 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:33724 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xD0B91B92 Ack: 0x5025667C Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:11.630455 24.98.22.117:3575 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:34450 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xD13C72C2 Ack: 0x51091E4E Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:12.412330 24.98.22.117:3582 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:34514 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD144AF19 Ack: 0x50D273E0 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:22.184746 24.98.22.117:3724 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:35303 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD1D4D108 Ack: 0x515FD3AF Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:22.880494 24.98.22.117:3739 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:35369 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD1E18CB7 Ack: 0x52521CB3 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:23.510219 24.98.22.117:3747 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:35436 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xD1EA841B Ack: 0x520F7FE5 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:33.195970 24.98.22.117:3885 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:36211 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xD274F463 Ack: 0x523C4383 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:37.010169 24.98.22.117:3950 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:36562 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xD2B1A0E8 Ack: 0x52973179 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:37.643553 24.98.22.117:3960 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:36631 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xD2BC464C Ack: 0x53269E8C Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-04:25:38.395559 24.98.22.117:3972 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:36700 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xD2C7D0EF Ack: 0x53194087 Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:52 2003