[Silicon Defense logo]

SnortSnarf alert page

Source: 24.202.34.72

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 21:03:52.662701 on 05/17/2003
Latest: 21:05:03.220383 on 05/17/2003

6 different signatures are present for 24.202.34.72 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.202.34.72 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:03:52.662701 24.202.34.72:4306 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:55745 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xBFB08367 Ack: 0x9E2D2779 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:03:59.130684 24.202.34.72:4409 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:56263 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xC0108968 Ack: 0x9ECEC0A9 Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:01.101134 24.202.34.72:4432 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:56418 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xC027D399 Ack: 0x9EEAD255 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:03.038482 24.202.34.72:4470 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:56527 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xC0473659 Ack: 0x9EE996A3 Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:08.249171 24.202.34.72:4486 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:56854 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC05A12D5 Ack: 0x9F315C46 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/17-21:04:10.508844 24.202.34.72:4555 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:57005 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xC09B659E Ack: 0x9F64B9F2 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/17-21:04:13.007993 24.202.34.72:4592 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:57161 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xC0BDA837 Ack: 0x9F1DE732 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:18.488402 24.202.34.72:4620 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:57480 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xC0DC13F8 Ack: 0x9F355E37 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:20.468709 24.202.34.72:4687 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:57638 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC11EB576 Ack: 0x9FDC8407 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:31.918536 24.202.34.72:4843 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:58333 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC1AF7976 Ack: 0xA037768C Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:36.864713 24.202.34.72:4872 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:58675 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC1CC47E6 Ack: 0x9FFB95F7 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:38.882274 24.202.34.72:4980 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:58816 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC210E053 Ack: 0xA11F8387 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:48.021468 24.202.34.72:1090 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:59350 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xC253B91E Ack: 0xA0AB6CD1 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:49.973170 24.202.34.72:1164 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:59518 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC29CC707 Ack: 0xA16844B9 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:04:52.054952 24.202.34.72:1197 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:59662 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xC2BA1100 Ack: 0xA155E841 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/17-21:05:03.220383 24.202.34.72:1376 -> 192.168.1.6:80
TCP TTL:108 TOS:0x0 ID:60546 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC35C9E85 Ack: 0xA27F1EA3 Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:53 2003