[Silicon Defense logo]

SnortSnarf alert page

Source: 24.91.103.152

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

18 such alerts found using input module SnortFileInput, with sources:
Earliest: 23:09:47.159677 on 04/23/2003
Latest: 23:10:19.155748 on 04/23/2003

6 different signatures are present for 24.91.103.152 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.91.103.152 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:09:47.159677 24.91.103.152:3919 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:27498 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0xE97652B3 Ack: 0xEE71E54F Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:09:51.521952 24.91.103.152:4208 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:28561 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0xEA59564C Ack: 0xEF07830C Win: 0x4470 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:09:52.092041 24.91.103.152:4252 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:28688 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xEA7B324D Ack: 0xEE80FDDF Win: 0x4470 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:09:52.803518 24.91.103.152:4283 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:28866 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0xEA954235 Ack: 0xEEBA8851 Win: 0x4470 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:09:56.971282 24.91.103.152:4546 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:29782 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEB603FD9 Ack: 0xEEFEC3FC Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/23-23:10:00.730756 24.91.103.152:1060 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:30704 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xEC315452 Ack: 0xEEF41532 Win: 0x4470 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
04/23-23:10:01.149570 24.91.103.152:1082 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:30792 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0xEC421AF2 Ack: 0xEEEC3615 Win: 0x4470 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:01.783822 24.91.103.152:1110 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:30932 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0xEC5966D3 Ack: 0xEFA41EAA Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:02.250242 24.91.103.152:1139 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:31030 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xEC702533 Ack: 0xEF26FDF0 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:06.402804 24.91.103.152:1363 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:31867 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xED1C96E4 Ack: 0xEFE4E58A Win: 0x4470 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:07.000552 24.91.103.152:1408 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:31998 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xED409F6D Ack: 0xF0182C0C Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:07.524208 24.91.103.152:1434 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:32117 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0xED568040 Ack: 0xEF7A75A4 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:10.998507 24.91.103.152:1697 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:32953 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xEE286853 Ack: 0xEFFD28B7 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:14.246625 24.91.103.152:1697 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:34242 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0xEE286853 Ack: 0xEFFD28B7 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:14.590339 24.91.103.152:1910 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:34337 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEED26AF5 Ack: 0xEFE5F11C Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:17.900872 24.91.103.152:1910 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:34985 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEED26AF5 Ack: 0xEFE5F11C Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:18.429440 24.91.103.152:2115 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:35095 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0xEF729643 Ack: 0xF07F56C2 Win: 0x4470 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
04/23-23:10:19.155748 24.91.103.152:2173 -> 192.168.1.6:80
TCP TTL:105 TOS:0x0 ID:35254 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0xEF9FC7BB Ack: 0xF0820A32 Win: 0x4470 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:54 2003