[Silicon Defense logo]

SnortSnarf alert page

Source: 24.130.204.30

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

15 such alerts found using input module SnortFileInput, with sources:
Earliest: 08:06:41.059263 on 05/20/2003
Latest: 08:07:45.709818 on 05/20/2003

6 different signatures are present for 24.130.204.30 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.130.204.30 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:06:41.059263 24.130.204.30:1878 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:29208 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x1A62BB11 Ack: 0xE49D1188 Win: 0x4098 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:06:45.993176 24.130.204.30:2115 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:30078 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x1B2327EB Ack: 0xE4C45844 Win: 0x4098 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:06:56.605172 24.130.204.30:2829 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:32048 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x1D4A643A Ack: 0xE5F07E24 Win: 0x4098 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:10.392855 24.130.204.30:3403 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:34570 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x1F0D6E2F Ack: 0xE7C05F6E Win: 0x4098 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:11.913173 24.130.204.30:3643 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:34859 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x1FCC160F Ack: 0xE7BC1181 Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/20-08:07:13.508469 24.130.204.30:3738 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:35129 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x2016514E Ack: 0xE7B982AC Win: 0x4098 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/20-08:07:15.449533 24.130.204.30:3818 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:35467 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x204EB5C3 Ack: 0xE74D1664 Win: 0x4098 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:20.285062 24.130.204.30:4072 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:36305 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x21164B83 Ack: 0xE79FA19C Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:24.805798 24.130.204.30:4305 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:37081 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x21CB70FB Ack: 0xE7D723B0 Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:26.454704 24.130.204.30:4398 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:37415 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x2210424F Ack: 0xE829473F Win: 0x4098 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:28.183140 24.130.204.30:4498 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:37704 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x225C3E97 Ack: 0xE89E9C08 Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:30.072911 24.130.204.30:4648 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:38062 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x2298073B Ack: 0xE8313974 Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:31.540115 24.130.204.30:4792 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:38310 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x22E3013A Ack: 0xE86E3C18 Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:33.131706 24.130.204.30:4976 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:38595 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x232C0E40 Ack: 0xE860582A Win: 0x4098 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/20-08:07:45.709818 24.130.204.30:1526 -> 192.168.1.6:80
TCP TTL:103 TOS:0x0 ID:40867 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x24C29028 Ack: 0xE8F46F69 Win: 0x4098 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:52 2003