[Silicon Defense logo]

SnortSnarf alert page

Source: 24.140.76.14

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

13 such alerts found using input module SnortFileInput, with sources:
Earliest: 05:26:14.641567 on 05/09/2003
Latest: 05:29:24.264364 on 05/09/2003

6 different signatures are present for 24.140.76.14 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.140.76.14 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:26:14.641567 24.140.76.14:3866 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:28598 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x75C62AFB Ack: 0x377534AB Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:26:23.657640 24.140.76.14:4155 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:29827 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x76B4B444 Ack: 0x38553B58 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:26:54.497738 24.140.76.14:1371 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:33216 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x7A07E9C9 Ack: 0x394CC833 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:27:13.269392 24.140.76.14:1993 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:35363 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x7C0A48BC Ack: 0x3B3A5C4C Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:27:22.244465 24.140.76.14:2309 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:36381 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7D0D4F76 Ack: 0x3B2016E5 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/09-05:27:35.068461 24.140.76.14:2721 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:37782 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x7E6D1941 Ack: 0x3C53D952 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/09-05:27:53.080697 24.140.76.14:3353 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:40166 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x8077D092 Ack: 0x3D0540D7 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:28:02.503155 24.140.76.14:3627 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:41191 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x815E1405 Ack: 0x3DD67AE2 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:28:33.272837 24.140.76.14:4649 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:44830 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x84ACD9E8 Ack: 0x3F39F0AC Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:28:52.467293 24.140.76.14:1452 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:47085 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x86AEE3A0 Ack: 0x405E150C Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:29:01.880474 24.140.76.14:1779 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:48136 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x87BD623D Ack: 0x41909BA9 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:29:10.890630 24.140.76.14:2085 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:49090 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x88B8CD79 Ack: 0x41E48D3F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/09-05:29:24.264364 24.140.76.14:2504 -> 192.168.1.6:80
TCP TTL:106 TOS:0x0 ID:50430 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x8A190067 Ack: 0x428CFE50 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003