[Silicon Defense logo]

SnortSnarf alert page

Source: 24.218.253.67

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

17 such alerts found using input module SnortFileInput, with sources:
Earliest: 23:41:56.724896 on 05/12/2003
Latest: 23:42:32.483173 on 05/12/2003

6 different signatures are present for 24.218.253.67 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.218.253.67 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:41:56.724896 24.218.253.67:4385 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:7246 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xBC59986F Ack: 0x22BAEB66 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:00.353167 24.218.253.67:4641 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:7803 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xBD0EEDEC Ack: 0x231BFEC8 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:07.595324 24.218.253.67:1085 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:8953 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xBDC19CF0 Ack: 0x22AE82C5 Win: 0xFAF0 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:08.409905 24.218.253.67:1311 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:9089 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xBE738E7B Ack: 0x233EBE2F Win: 0xFAF0 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:12.881211 24.218.253.67:1567 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:9840 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xBF42F7E1 Ack: 0x23CE8076 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/12-23:42:13.867033 24.218.253.67:1612 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:10011 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xBF67521C Ack: 0x23B18E35 Win: 0xFAF0 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/12-23:42:14.845230 24.218.253.67:1672 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:10168 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xBF9717BC Ack: 0x23F3725A Win: 0xFAF0 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:19.044654 24.218.253.67:1923 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:10855 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xC05B650F Ack: 0x24268045 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:19.829650 24.218.253.67:1967 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:10983 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC07D7FE9 Ack: 0x2354E5F3 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:23.714604 24.218.253.67:2209 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:11622 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC13F3F65 Ack: 0x23ECE7C7 Win: 0xFAF0 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:24.158132 24.218.253.67:2229 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:11693 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC14E42DC Ack: 0x245E7C83 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:24.686258 24.218.253.67:2261 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:11778 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xC163A803 Ack: 0x243EE3AE Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:28.380495 24.218.253.67:2488 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:12339 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xC218A5D8 Ack: 0x24108B5E Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:28.598252 24.218.253.67:2501 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:12361 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC22276EB Ack: 0x23F2F93C Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:31.711945 24.218.253.67:2501 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:12853 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC22276EB Ack: 0x23F2F93C Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:32.020953 24.218.253.67:2702 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:12904 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xC2C63512 Ack: 0x240B33DA Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/12-23:42:32.483173 24.218.253.67:2729 -> 192.168.1.6:80
TCP TTL:110 TOS:0x0 ID:12985 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xC2DBA7FC Ack: 0x24794FB0 Win: 0xFAF0 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003