[Silicon Defense logo]

SnortSnarf alert page

Source: 24.243.238.248

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 13:49:13.094012 on 05/16/2003
Latest: 13:49:38.620685 on 05/16/2003

6 different signatures are present for 24.243.238.248 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.243.238.248 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:13.094012 24.243.238.248:1618 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:6805 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xDE6C4D59 Ack: 0xF321F7A1 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:16.602898 24.243.238.248:2038 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7226 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xDEE7E412 Ack: 0xF364F19F Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:16.818779 24.243.238.248:2040 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7253 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xDEEA6A99 Ack: 0xF3461F10 Win: 0xFAF0 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:17.444261 24.243.238.248:2128 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7382 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xDF0FE3C4 Ack: 0xF38C1153 Win: 0xFAF0 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:17.657487 24.243.238.248:2160 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7447 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xDF22042B Ack: 0xF3D78D4D Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/16-13:49:17.927632 24.243.238.248:2193 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7516 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xDF2E21AC Ack: 0xF3F38E22 Win: 0xFAF0 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/16-13:49:18.178912 24.243.238.248:2242 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:7651 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xDF4A1D48 Ack: 0xF3EB74C2 Win: 0xFAF0 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:21.655735 24.243.238.248:2629 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:8243 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xDFDDED1F Ack: 0xF3EBDCB3 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:24.895409 24.243.238.248:2962 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:8725 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE0788F19 Ack: 0xF3C03775 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:25.144988 24.243.238.248:2984 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:8756 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE085EAD4 Ack: 0xF3AF4C7A Win: 0xFAF0 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:28.452263 24.243.238.248:3216 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:9399 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE11645B2 Ack: 0xF3C7A72B Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:31.704862 24.243.238.248:3517 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:10195 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xE1DF103A Ack: 0xF4EE6CBD Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:34.920789 24.243.238.248:3715 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:10621 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xE26E2483 Ack: 0xF507EA2C Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:35.130414 24.243.238.248:3724 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:10640 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xE2741CB6 Ack: 0xF51750FB Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:35.375654 24.243.238.248:3732 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:10666 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xE27B664E Ack: 0xF459474C Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/16-13:49:38.620685 24.243.238.248:3916 -> 192.168.1.6:80
TCP TTL:112 TOS:0x0 ID:11270 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xE30CC56B Ack: 0xF54029E6 Win: 0xFAF0 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003