[Silicon Defense logo]

SnortSnarf alert page

Source: 24.99.49.210

SnortSnarf v021111.1

Signature section (91123)Top 20 source IPsTop 20 dest IPs

16 such alerts found using input module SnortFileInput, with sources:
Earliest: 01:01:00.581667 on 05/29/2003
Latest: 01:01:27.458063 on 05/29/2003

6 different signatures are present for 24.99.49.210 as a source

There are 1 distinct destination IPs in the alerts of the type on this page.

24.99.49.210 Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade


[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:00.581667 24.99.49.210:3251 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:8240 IpLen:20 DgmLen:112 DF
***AP*** Seq: 0x7A137434 Ack: 0xDACF0E05 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:01.436227 24.99.49.210:3297 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:8331 IpLen:20 DgmLen:110 DF
***AP*** Seq: 0x7A391AB5 Ack: 0xDAAB6824 Win: 0xFAF0 TcpLen: 20
[Xref => http://www.cert.org/advisories/CA-2001-19.html]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:01.824412 24.99.49.210:3303 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:8363 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x7A3F32C5 Ack: 0xDAAF6D79 Win: 0xFAF0 TcpLen: 20
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:11.834661 24.99.49.210:3563 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:9120 IpLen:20 DgmLen:120 DF
***AP*** Seq: 0x7B22EA72 Ack: 0xDAE4C386 Win: 0xFAF0 TcpLen: 20
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:12.092766 24.99.49.210:3576 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:9152 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7B2EB695 Ack: 0xDB56CA63 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/29-01:01:12.375934 24.99.49.210:3587 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:9183 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x7B373B56 Ack: 0xDAE35950 Win: 0xFAF0 TcpLen: 20
[**] [1:1286:5] WEB-IIS _mem_bin access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
05/29-01:01:12.627927 24.99.49.210:3596 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:9208 IpLen:20 DgmLen:157 DF
***AP*** Seq: 0x7B3F08AE Ack: 0xDB4DB6E0 Win: 0xFAF0 TcpLen: 20
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:22.229288 24.99.49.210:3872 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10045 IpLen:20 DgmLen:185 DF
***AP*** Seq: 0x7C30BF0F Ack: 0xDBD42FC3 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:22.401935 24.99.49.210:3881 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10068 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7C38BA41 Ack: 0xDC34721F Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:22.730637 24.99.49.210:3888 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10088 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7C3EBC43 Ack: 0xDC153484 Win: 0xFAF0 TcpLen: 20
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:22.995005 24.99.49.210:3897 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10116 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7C47B977 Ack: 0xDBDE7430 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:23.333086 24.99.49.210:3906 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10148 IpLen:20 DgmLen:137 DF
***AP*** Seq: 0x7C4FEB62 Ack: 0xDBABD5AB Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:23.564302 24.99.49.210:3924 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10174 IpLen:20 DgmLen:138 DF
***AP*** Seq: 0x7C5DFBDF Ack: 0xDBDA01C1 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:26.953300 24.99.49.210:3931 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10482 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7C646A52 Ack: 0xDC0C7901 Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:970:5] WEB-IIS multiple decode attempt [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:27.160433 24.99.49.210:4034 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10510 IpLen:20 DgmLen:140 DF
***AP*** Seq: 0x7CC04AA5 Ack: 0xDC2B9E7E Win: 0xFAF0 TcpLen: 20
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333]
[**] [1:1002:5] WEB-IIS cmd.exe access [**]
[Classification: Web Application Attack] [Priority: 1]
05/29-01:01:27.458063 24.99.49.210:4042 -> 192.168.1.6:80
TCP TTL:109 TOS:0x0 ID:10539 IpLen:20 DgmLen:136 DF
***AP*** Seq: 0x7CC63EF6 Ack: 0xDC007D32 Win: 0xFAF0 TcpLen: 20

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Jun 17 09:03:53 2003