[Silicon Defense logo]

SnortSnarf alert page

Source: 129.128.5.191

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

6 such alerts found using input module SnortFileInput, with sources:
Earliest: 22:08:06.278809 on 04/26/2003
Latest: 21:05:32.712689 on 05/05/2003

1 different signatures are present for 129.128.5.191 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

129.128.5.191 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/26-22:08:06.278809 129.128.5.191:20 -> 192.168.1.4:1232
TCP TTL:236 TOS:0x0 ID:19107 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x4DE29D58 Ack: 0x8CD298E4 Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/26-22:08:06.654949 129.128.5.191:20 -> 192.168.1.4:1232
TCP TTL:236 TOS:0x0 ID:19126 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x4DE30910 Ack: 0x8CD298E4 Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/26-22:08:40.791023 129.128.5.191:20 -> 192.168.1.4:1234
TCP TTL:236 TOS:0x0 ID:20130 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x4F0BF87A Ack: 0x8D4810EA Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/26-22:08:41.311217 129.128.5.191:20 -> 192.168.1.4:1234
TCP TTL:236 TOS:0x0 ID:20149 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x4F0C6432 Ack: 0x8D4810EA Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/05-21:05:30.970486 129.128.5.191:20 -> 192.168.1.4:1126
TCP TTL:236 TOS:0x0 ID:2450 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x5D8CC94C Ack: 0x3609CBDC Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/05-21:05:32.712689 129.128.5.191:20 -> 192.168.1.4:1126
TCP TTL:236 TOS:0x0 ID:2469 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x5D8D3504 Ack: 0x3609CBDC Win: 0x2238 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:53 2003