[Silicon Defense logo]

SnortSnarf alert page

Source: 24.30.227.136

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

17 such alerts found using input module SnortFileInput, with sources:
Earliest: 17:52:18.110375 on 05/15/2003
Latest: 17:53:06.291726 on 05/15/2003

6 different signatures are present for 24.30.227.136 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.30.227.136 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:18.110375 24.30.227.136:4126 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:30849 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x15FA99B3 Ack: 0xB893BBFF Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:24.680213 24.30.227.136:4318 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:31721 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x16A203F2 Ack: 0xB920E51E Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:25.370646 24.30.227.136:4330 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:31804 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x16AD9E23 Ack: 0xB8B3483A Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:26.121091 24.30.227.136:4355 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:31910 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x16C45E6F Ack: 0xB8E0D66C Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:26.831234 24.30.227.136:4377 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:32008 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x16D8030B Ack: 0xB8A6862B Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/15-17:52:27.488360 24.30.227.136:4392 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:32093 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x16E4F0F9 Ack: 0xB9489C8E Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/15-17:52:31.674558 24.30.227.136:4517 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:32663 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x175216A3 Ack: 0xB9946608 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:32.150053 24.30.227.136:4533 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:32750 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x17601078 Ack: 0xB9ABAD0F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:42.494568 24.30.227.136:4848 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:34145 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x186AB585 Ack: 0xB9B62F2F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:55.642345 24.30.227.136:3153 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:35952 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x196DAE82 Ack: 0xBA196E88 Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:52:56.388419 24.30.227.136:3261 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:36070 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x19CC115F Ack: 0xBAC9FC6F Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:00.435643 24.30.227.136:3380 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:36643 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x1A30D569 Ack: 0xBAC3CC40 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:01.182685 24.30.227.136:3407 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:36759 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x1A4674B8 Ack: 0xBB7667F9 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:01.926359 24.30.227.136:3434 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:36857 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x1A5C1A5C Ack: 0xBB7AFFEA Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:04.847634 24.30.227.136:3434 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:37322 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x1A5C1A5C Ack: 0xBB7AFFEA Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:05.634262 24.30.227.136:3566 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:37413 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x1ACDEF59 Ack: 0xBB376497 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/15-17:53:06.291726 24.30.227.136:3586 -> 192.168.1.6:80
TCP TTL:111 TOS:0x0 ID:37494 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x1ADDB51B Ack: 0xBBC1BB2B Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:09:28 2003