BotHunter ®
  Live Internet Monitor Page
  Computer Science Laboratory
  SRI International


  Last Updated: Mon Mar 25 23:00:05 2013
BOTHUNTER LOGO
www.BOTHUNTER.net


Victim IP
Max Score
Profiles
CCs
Events
192.168.1.85
1.0 VIEW 1
  • 77.75.77.32 77.75.77.32 (Dsl), Mapy.Cz, Seznam.Cz, Prague, Hlavni Mesto Praha, Czech Republic.
  • 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->37761
  • 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->37761
192.168.1.100
1.2 VIEW 8
  • 195.128.181.52 195.128.181.52 (Dsl), Net.Pl, Eurofux-Wojkowice-Pl, Warsaw, Mazowieckie, Poland, Malware Controller.
  • 199.255.189.60 199.255.189.60 (-), -, -, -.
  • 213.249.68.98 213.249.68.98 (Dsl), -, Networking4all, Amsterdam, Noord-Holland, Netherlands, Malware Controller.
  • 69.16.229.102 69.16.229.102 (Dsl), Liquidweb.Com, Liquid Web Inc, Lansing, Michigan, United States, Malware Controller Mail Abuser.
  • 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
  • 1:2012801 {tcp} C&C Communication: ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/bacon-austin?start=200&sort_by=date_desc&rpp=40]; 54184->80
  • 1:9920020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on standard port
  • 1:2012801 (2) {tcp} C&C Communication: ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/biz/bacon-austin?start=200&sort_by=date_desc&rpp=40]; 54184->80
  • 1:3810008 {udp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 40554->53
192.168.1.102
0.8 VIEW 1
  • 195.128.181.52 195.128.181.52 (Dsl), Net.Pl, Eurofux-Wojkowice-Pl, Warsaw, Mazowieckie, Poland, Malware Controller.
  • 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
192.168.1.41
1.6 VIEW 56
     
  • 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 11 IPs (7 /24s) (# pkts S/M/O/I=0/10/1/0): 22:10
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 39241->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 49132->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 44691->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 36258->22
  • 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 49683->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 40264->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 49908->22
  • 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 43 IPs (28 /24s) (# pkts S/M/O/I=0/43/0/0): 22:43
  • 777:7777005 (2) {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (7 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 50583->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 51033->22
  • 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (9 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
  • 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 44 IPs (29 /24s) (# pkts S/M/O/I=0/43/1/0): 22:43
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 51709->22
  • 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (6 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 58064->22
  • 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 59416->22
192.168.1.36
0.8 VIEW 21
  • 69.43.161.167 69.43.161.167 (Dsl), 22a52.Com, Castle Access Inc, Coronado, California, United States, Mail Abuser Malware Controller.
  • 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
  • 1:9930009 {tcp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port