[Silicon Defense logo]

SnortSnarf alert page

Source: 24.148.68.177

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

17 such alerts found using input module SnortFileInput, with sources:
Earliest: 15:55:19.674540 on 05/12/2003
Latest: 15:55:50.902880 on 05/12/2003

6 different signatures are present for 24.148.68.177 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.148.68.177 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:19.674540 24.148.68.177:1038 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:9465 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x88C3BBFB Ack: 0x3DBE9990 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:24.002105 24.148.68.177:1131 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:9723 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x891EACA8 Ack: 0x3F415E88 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:24.520621 24.148.68.177:1145 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:9763 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x892CD060 Ack: 0x3FA90A8D Win: 0xFAF0 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:25.092895 24.148.68.177:1160 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:9830 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x8939B32A Ack: 0x3F5EC0DC Win: 0xFAF0 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:25.752998 24.148.68.177:1220 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:9966 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x896938E8 Ack: 0x3FCBF037 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/12-15:55:26.457200 24.148.68.177:1283 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10010 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x899922E8 Ack: 0x3F37676A Win: 0xFAF0 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/12-15:55:31.415654 24.148.68.177:1353 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10348 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x89DC0A01 Ack: 0x40294B9E Win: 0xFAF0 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:33.095746 24.148.68.177:1376 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10417 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x89F350A6 Ack: 0x404967EC Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:34.780823 24.148.68.177:1410 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10524 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x8A1211FD Ack: 0x4067B91A Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:36.419131 24.148.68.177:1430 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10669 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x8A27035F Ack: 0x401A0773 Win: 0xFAF0 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:37.822272 24.148.68.177:1449 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10730 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x8A3CC8AB Ack: 0x3FB01A7D Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:39.168655 24.148.68.177:1480 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10813 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x8A578C33 Ack: 0x408A09BE Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:40.554925 24.148.68.177:1495 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:10895 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x8A672B71 Ack: 0x4073A0B1 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:43.651175 24.148.68.177:1495 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:11060 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x8A672B71 Ack: 0x4073A0B1 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:45.106292 24.148.68.177:1579 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:11124 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x8AB0CEAD Ack: 0x4059D168 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:46.910116 24.148.68.177:1600 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:11255 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x8AC532EF Ack: 0x4036767B Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-15:55:50.902880 24.148.68.177:1778 -> 192.168.1.6:80
TCP TTL:115 TOS:0x0 ID:11642 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x8B5BEA1C Ack: 0x40DAC6FE Win: 0xFAF0 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:52 2003