[Silicon Defense logo]

SnortSnarf alert page

Source: 24.197.103.210

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 00:43:28.700389 on 06/09/2003
Latest: 00:44:53.742269 on 06/09/2003

6 different signatures are present for 24.197.103.210 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.197.103.210 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:43:28.700389 24.197.103.210:4393 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:3278 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xDBF20E24 Ack: 0x568B9603 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:43:42.184810 24.197.103.210:4752 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:4467 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xDD251F87 Ack: 0x56D063E2 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:43:48.972707 24.197.103.210:1057 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:5045 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xDDBCE02A Ack: 0x57A51A5E Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:00.626728 24.197.103.210:1358 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:6035 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xDECC8281 Ack: 0x579FFAC3 Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:04.428405 24.197.103.210:1407 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:6257 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xDEF8CEDD Ack: 0x5840256F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
06/09-00:44:07.370332 24.197.103.210:1500 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:6559 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xDF4740A7 Ack: 0x585F2629 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
06/09-00:44:11.197836 24.197.103.210:1573 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:6815 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xDF875B3F Ack: 0x5892D709 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:14.083515 24.197.103.210:1656 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:7099 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xDFD22014 Ack: 0x58FAC7AB Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:17.974348 24.197.103.210:1725 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:7359 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE00F1254 Ack: 0x5950DC4D Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:20.864904 24.197.103.210:1821 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:7574 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE064306C Ack: 0x58B33A40 Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:36.356936 24.197.103.210:2096 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:8796 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE15890D1 Ack: 0x5A117F08 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:40.230005 24.197.103.210:2248 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:9075 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE1D48ABB Ack: 0x5A495813 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:43.093161 24.197.103.210:2337 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:9350 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xE2264060 Ack: 0x5A666968 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:46.969809 24.197.103.210:2414 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:9586 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xE268B871 Ack: 0x5A71AAB0 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:49.873320 24.197.103.210:2503 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:9810 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xE2B77E54 Ack: 0x5AFCB328 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
06/09-00:44:53.742269 24.197.103.210:2569 -> 192.168.1.6:80
TCP TTL:113 TOS:0x0 ID:10096 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xE2F31EB3 Ack: 0x5B8F668A Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003