BotHunter ®
Live Internet Monitor Page
Computer Science Laboratory
SRI International
Last Updated: Sun Mar 24 23:00:03 2013
|
|

|
|
Victim IP
|
Max Score
|
Profiles
|
CCs
|
Events
|
192.168.1.85
|
1.0 |
VIEW 1 |
- 66.249.74.230 66.249.74.230 (Dial), Google.Com, Google Inc, Cabot, Arkansas, United States.
|
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->42258
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->61026
|
192.168.1.100
|
1.2 |
VIEW 2 |
- 199.255.189.160 199.255.189.160 (-), -, -, -.
- 213.249.68.98 213.249.68.98 (Dsl), -, Networking4all, Amsterdam, Noord-Holland, Netherlands, Malware Controller.
- 207.58.145.102 207.58.145.102 (Dsl), Servint.Net, Smv, Mclean, Virginia, United States, Malware Controller Mail Abuser.
|
- 1:2012801 {tcp} C&C Communication: ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/j-and-j-drug-austin?start=0&sort_by=date_desc&rpp=40]; 36666->80
- 1:9920020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on standard port
- 1:2012801 (2) {tcp} C&C Communication: ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/j-and-j-drug-austin?start=0&sort_by=date_desc&rpp=40]; 36666->80
- 1:3810008 {udp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 43720->53
|
192.168.1.41
|
1.6 |
VIEW 171 |
|
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 45567->22
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 41136->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 41136->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 39693->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 55480->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 43 IPs (28 /24s) (# pkts S/M/O/I=0/43/0/0): 22:43
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 45793->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 39919->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 46018->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 46694->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (9 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 44 IPs (29 /24s) (# pkts S/M/O/I=0/43/1/0): 22:43
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 44 IPs (29 /24s) (# pkts S/M/O/I=0/43/2/0): 22:43
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 44 IPs (29 /24s) (# pkts S/M/O/I=0/43/2/0): 22:43
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 48053->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (8 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 48728->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 48955->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 19 IPs (15 /24s) (# pkts S/M/O/I=0/19/0/0): 22:19
|
192.168.1.14
|
1.0 |
VIEW 3 |
|
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->52282
- 1:552123 (4) {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->40223
- 1:2002033 (9) {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->52282
- 1:552123 (5) {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->40223
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->35348
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->35348
|
192.168.1.36
|
0.8 |
VIEW 22 |
- 69.43.161.167 69.43.161.167 (Dsl), 22a52.Com, Castle Access Inc, Coronado, California, United States, Mail Abuser Malware Controller.
|
- 1:9930009 {tcp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
- 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
|
|
|