[Silicon Defense logo]

SnortSnarf alert page

Destination: 192.168.1.104

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 23:32:06.425602 on 04/22/2003
Latest: 23:12:25.058776 on 05/20/2003

3 different signatures are present for 192.168.1.104 as a destination

There are 8 distinct source IPs in the alerts of the type on this page.

192.168.1.104 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:649:5] SHELLCODE x86 setgid 0 [**]
[Classification: A system call was detected] [Priority: 2]
04/22-23:32:06.425602 206.151.167.227:80 -> 192.168.1.104:1087
TCP TTL:241 TOS:0x0 ID:63374 IpLen:20 DgmLen:1500
***A**** Seq: 0xC7530038 Ack: 0x6EEA1031 Win: 0x832C TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS284]
[**] [1:1394:3] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/22-23:42:54.837027 206.151.167.94:80 -> 192.168.1.104:1072
TCP TTL:50 TOS:0x0 ID:22976 IpLen:20 DgmLen:1500
***A**** Seq: 0xEE6E074B Ack: 0x6D53B922 Win: 0x1920 TcpLen: 20
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/23-00:12:38.182727 199.45.62.12:80 -> 192.168.1.104:1073
TCP TTL:47 TOS:0x0 ID:22524 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0x5FF4FA55 Ack: 0x29E6EE53 Win: 0x7D78 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/23-16:18:09.068536 64.215.164.100:80 -> 192.168.1.104:1222
TCP TTL:49 TOS:0x0 ID:45283 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0x9A8FD0E0 Ack: 0x9B45E134 Win: 0x7D78 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/23-16:18:10.152947 64.215.164.100:80 -> 192.168.1.104:1222
TCP TTL:49 TOS:0x0 ID:49233 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0x9A90FF24 Ack: 0x9B45E134 Win: 0x7D78 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/24-00:06:38.949450 192.150.18.28:80 -> 192.168.1.104:1403
TCP TTL:46 TOS:0x0 ID:37359 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x8613DAD0 Ack: 0xA2944D4B Win: 0x1920 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/24-00:06:39.181738 192.150.18.28:80 -> 192.168.1.104:1403
TCP TTL:46 TOS:0x0 ID:37369 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0x861413D8 Ack: 0xA2944D4B Win: 0x1920 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/24-00:06:39.579797 192.150.18.28:80 -> 192.168.1.104:1403
TCP TTL:46 TOS:0x0 ID:37399 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x8614BEF0 Ack: 0xA2944D4B Win: 0x1920 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/24-00:06:39.583215 192.150.18.28:80 -> 192.168.1.104:1403
TCP TTL:46 TOS:0x0 ID:37402 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x8614D00C Ack: 0xA2944D4B Win: 0x1920 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/24-00:06:39.644373 192.150.18.28:80 -> 192.168.1.104:1403
TCP TTL:46 TOS:0x0 ID:37404 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0x8614DB74 Ack: 0xA2944D4B Win: 0x1920 TcpLen: 20
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:1841:2] WEB-CLIENT javascript URL host spoofing attempt [**]
[Classification: Attempted User Privilege Gain] [Priority: 1]
04/29-14:29:03.206419 209.15.189.173:80 -> 192.168.1.104:2760
TCP TTL:45 TOS:0x0 ID:49103 IpLen:20 DgmLen:1300 DF
***A**** Seq: 0x7296675D Ack: 0x7064E429 Win: 0x1920 TcpLen: 20
[Xref => http://www.securityfocus.com/bid/5293]
[**] [1:1841:2] WEB-CLIENT javascript URL host spoofing attempt [**]
[Classification: Attempted User Privilege Gain] [Priority: 1]
04/29-14:29:03.208039 209.15.189.173:80 -> 192.168.1.104:2760
TCP TTL:45 TOS:0x0 ID:49104 IpLen:20 DgmLen:1300 DF
***A**** Seq: 0x72966C49 Ack: 0x7064E429 Win: 0x1920 TcpLen: 20
[Xref => http://www.securityfocus.com/bid/5293]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/20-22:39:07.797730 152.2.210.121:80 -> 192.168.1.104:49882
TCP TTL:48 TOS:0x0 ID:55506 IpLen:20 DgmLen:1500 DF
***AP*** Seq: 0xBB55190C Ack: 0x551F38C8 Win: 0x7C70 TcpLen: 32
TCP Options (3) => NOP NOP TS: 1816909369 3676141532
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/20-22:39:07.845697 152.2.210.121:80 -> 192.168.1.104:49882
TCP TTL:48 TOS:0x0 ID:55617 IpLen:20 DgmLen:156 DF
***AP**F Seq: 0xBB55245C Ack: 0x551F3B50 Win: 0x7C70 TcpLen: 32
TCP Options (3) => NOP NOP TS: 1816909374 3676141532
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/20-23:12:19.653909 64.125.133.202:80 -> 192.168.1.104:49974
TCP TTL:39 TOS:0x0 ID:58523 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0xDE901C17 Ack: 0xF2791B87 Win: 0x6028 TcpLen: 32
TCP Options (3) => NOP NOP TS: 1625993351 3676145515
[Xref => http://www.whitehats.com/info/IDS181]
[**] [1:648:5] SHELLCODE x86 NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/20-23:12:25.058776 64.125.133.202:80 -> 192.168.1.104:49978
TCP TTL:39 TOS:0x0 ID:62914 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0xDEFD3812 Ack: 0x656AB5BC Win: 0x6028 TcpLen: 32
TCP Options (3) => NOP NOP TS: 1625993891 3676145526
[Xref => http://www.whitehats.com/info/IDS181]

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:55 2003