[Silicon Defense logo]

SnortSnarf alert page

Source: 24.50.102.88

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 20:12:06.119424 on 04/27/2003
Latest: 20:13:00.321437 on 04/27/2003

6 different signatures are present for 24.50.102.88 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.50.102.88 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:06.119424 24.50.102.88:2543 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:53799 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x72AF02F4 Ack: 0x4E02013A Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:13.680103 24.50.102.88:2817 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:54961 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x7389A7B8 Ack: 0x4E81EB1C Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:14.106274 24.50.102.88:3040 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:55022 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x742DCF3B Ack: 0x4E181778 Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:17.803035 24.50.102.88:3076 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:55659 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x744ABFDD Ack: 0x4E4E260F Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:21.055475 24.50.102.88:3295 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:56227 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x74FD24B9 Ack: 0x4ED66D2B Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/27-20:12:24.739244 24.50.102.88:3700 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:56802 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x762D2D82 Ack: 0x4F592C08 Win: 0x4470 TcpLen: 20
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/27-20:12:27.822421 24.50.102.88:3700 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:57253 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x762D2D82 Ack: 0x4F592C08 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/27-20:12:28.656980 24.50.102.88:3893 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:57360 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x76C23C64 Ack: 0x4F4ACF18 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:32.867994 24.50.102.88:4106 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:57872 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x775FD950 Ack: 0x4F778BDA Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:43.316118 24.50.102.88:1067 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:59513 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7961B39B Ack: 0x503C9154 Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:43.947969 24.50.102.88:1096 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:59613 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x797A7AE8 Ack: 0x505BECB1 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:48.509132 24.50.102.88:1340 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:60278 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7A3F7D73 Ack: 0x50AE46E5 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:49.192225 24.50.102.88:1389 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:60404 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x7A662446 Ack: 0x50FF6DC4 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:49.846839 24.50.102.88:1437 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:60508 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7A8DCB84 Ack: 0x50329683 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:12:50.498639 24.50.102.88:1479 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:60611 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x7AAC433A Ack: 0x5110EFB1 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/27-20:13:00.321437 24.50.102.88:2075 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:62117 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7C856351 Ack: 0x511CCCFF Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:52 2003