[Silicon Defense logo]

SnortSnarf alert page

Source: 216.180.163.210

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

13 such alerts found using input module SnortFileInput, with sources:
Earliest: 09:19:46.472064 on 04/28/2003
Latest: 17:56:09.874745 on 06/06/2003

1 different signatures are present for 216.180.163.210 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

216.180.163.210 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/28-09:19:46.472064 216.180.163.210:80 -> 192.168.1.102:1311
TCP TTL:112 TOS:0x0 ID:32349 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x56A7E23A Ack: 0xE753A3FC Win: 0xF893 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
04/28-09:20:19.895165 216.180.163.210:80 -> 192.168.1.102:1311
TCP TTL:112 TOS:0x0 ID:49527 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x56A91AB0 Ack: 0xE753B3E1 Win: 0xFAF0 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/01-07:48:20.101418 216.180.163.210:80 -> 192.168.1.102:1995
TCP TTL:105 TOS:0x0 ID:33083 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x7F3EAC2A Ack: 0x2A0BBD70 Win: 0xF80F TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/01-07:48:58.084183 216.180.163.210:80 -> 192.168.1.102:1979
TCP TTL:105 TOS:0x0 ID:42366 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x7EE32B10 Ack: 0x29D877ED Win: 0xFAF0 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:47:11.776532 216.180.163.210:80 -> 192.168.1.102:1385
TCP TTL:112 TOS:0x0 ID:59515 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x96D67E6A Ack: 0x490DFF59 Win: 0xF893 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:47:12.083100 216.180.163.210:80 -> 192.168.1.102:1385
TCP TTL:112 TOS:0x0 ID:59594 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x96D67E6A Ack: 0x490DFF59 Win: 0xF893 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:49:20.358295 216.180.163.210:80 -> 192.168.1.102:1386
TCP TTL:112 TOS:0x0 ID:40825 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x97266FBA Ack: 0x4931A38D Win: 0xF9B8 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:49:20.824279 216.180.163.210:80 -> 192.168.1.102:1386
TCP TTL:112 TOS:0x0 ID:41226 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x97266FBA Ack: 0x4931A38D Win: 0xF9B8 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:49:21.829739 216.180.163.210:80 -> 192.168.1.102:1386
TCP TTL:112 TOS:0x0 ID:41655 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x97266FBA Ack: 0x4931A38D Win: 0xF9B8 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:49:23.842818 216.180.163.210:80 -> 192.168.1.102:1386
TCP TTL:112 TOS:0x0 ID:42427 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x97266FBA Ack: 0x4931A38D Win: 0xF9B8 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
05/29-15:49:27.865192 216.180.163.210:80 -> 192.168.1.102:1386
TCP TTL:112 TOS:0x0 ID:43823 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x97266FBA Ack: 0x4931A38D Win: 0xF9B8 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
06/06-17:53:04.869043 216.180.163.210:80 -> 192.168.1.102:2284
TCP TTL:113 TOS:0x0 ID:49986 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0xC01EBA4E Ack: 0xD7FDBB8A Win: 0xF640 TcpLen: 20
[**] [1:1390:3] SHELLCODE x86 inc ebx NOOP [**]
[Classification: Executable code was detected] [Priority: 1]
06/06-17:56:09.874745 216.180.163.210:80 -> 192.168.1.102:2287
TCP TTL:113 TOS:0x0 ID:55740 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0xC6B45853 Ack: 0xDADA6031 Win: 0xF644 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:52 2003