[Silicon Defense logo]

SnortSnarf alert page

Source: 24.30.204.145

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 22:56:15.230199 on 04/18/2003
Latest: 22:56:29.544125 on 04/18/2003

6 different signatures are present for 24.30.204.145 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.30.204.145 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:15.230199 24.30.204.145:2104 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:42658 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x5260352C Ack: 0x78788FDA Win: 0x2058 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:15.576051 24.30.204.145:2131 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:8099 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x9B162DDA Ack: 0x77908843 Win: 0x2058 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:15.699290 24.30.204.145:2142 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:19107 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xB496E859 Ack: 0x77B3ECE5 Win: 0x2058 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:25.048238 24.30.204.145:2872 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:2222 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xADE179E2 Ack: 0x7899F6B2 Win: 0x2058 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:28.334164 24.30.204.145:3147 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:14770 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x989BBFB3 Ack: 0x78F01E06 Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/18-22:56:28.435078 24.30.204.145:3154 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:21938 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x6A372164 Ack: 0x78BFD2BB Win: 0x2058 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/18-22:56:28.541251 24.30.204.145:3168 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:29874 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x574C3090 Ack: 0x78B7DA34 Win: 0x2058 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:28.659429 24.30.204.145:3172 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:40882 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x77BA6AFE Ack: 0x7850C203 Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:28.782366 24.30.204.145:3175 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:50866 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x8D25A006 Ack: 0x78B6B302 Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:28.873960 24.30.204.145:3182 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:55474 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x752C4494 Ack: 0x78EBBCCF Win: 0x2058 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:28.989889 24.30.204.145:3195 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:64946 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x59F6A270 Ack: 0x790C2F3B Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:29.098278 24.30.204.145:3205 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:8115 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x67C45942 Ack: 0x78A2868A Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:29.205272 24.30.204.145:3208 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:12979 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x3EF8D977 Ack: 0x787023AE Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:29.304320 24.30.204.145:3216 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:23219 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x6A45080F Ack: 0x793A81F0 Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:29.422006 24.30.204.145:3232 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:37043 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x40E327D8 Ack: 0x78814813 Win: 0x2058 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/18-22:56:29.544125 24.30.204.145:3244 -> 192.168.1.6:80
TCP TTL:116 TOS:0x0 ID:50611 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x437E4655 Ack: 0x79452B2B Win: 0x2058 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003