BotHunter ®
Live Internet Monitor Page
Computer Science Laboratory
SRI International
Last Updated: Fri Apr 26 23:00:02 2013
|
|

|
|
Victim IP
|
Max Score
|
Profiles
|
CCs
|
Events
|
192.168.1.138
|
1.3 |
VIEW 2 |
|
- 1:22351 {tcp} Inbound Attack: REGISTERED FREE NETBIOS DCERPC ISystemActivator path overflow attempt little endian unicode MAC_Dst: 00:30:48:30:03:AE; 135<-2589
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 1027->707
- 1:1444 (2) {udp} Egg Download: TFTP GET from external source; 1028->69
- 1:2008120 (2) {udp} Egg Download: ET POLICY Outbound TFTP Read Request; 1028->69
- 1:3001441 (2) {udp} Egg Download: TFTP GET .exe from external source; 1028->69
|
192.168.1.21
|
0.8 |
VIEW 1 |
|
- 1:22009200 {tcp} Inbound Attack: ET CURRENT_EVENTS Conficker.a Shellcode MAC_Dst: 00:30:48:30:03:AE; 445<-1915
- 1:2001685 {tcp} Egg Download: ET MALWARE Possible Windows executable sent when remote host claims to send an image; 1028<-5040
|
192.168.1.100
|
1.1 |
VIEW 5 |
- 195.128.181.52 195.128.181.52 (Dsl), Net.Pl, Eurofux-Wojkowice-Pl, Warsaw, Mazowieckie, Poland, Malware Controller.
- 198.51.132.160 198.51.132.160 (Dsl), Speakeasy.Net, -, United States.
- 195.70.51.165 195.70.51.165 (Comp), Interware.Hu, Interware Inc, Budapest, Hungary, Malware Controller.
- 64.46.38.31 64.46.38.31 (Comp), Vacationmedia.Net, Rackforce Hosting Inc, Kelowna, British Columbia, Canada, Malware Controller Mail Abuser.
|
- 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
- 1:2012801 {tcp} C&C Communication: ET TROJAN Spoofed MSIE 7 User-Agent Likely Ponmocup, [/user_details_thanx?userid=o84KZeqgy0YGLmz5I9P-pg&thanx_start=3280]; 52270->80
- 1:9920020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on standard port
- 1:3810008 {udp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 60532->53
|
192.168.1.36
|
0.9 |
VIEW 28 |
- 208.95.172.130 208.95.172.130 (Dsl), Cognosnet.Com, Isohunt Web Technologies Inc, Vancouver, British Columbia, Canada, Malware Controller.
- 69.43.161.167 69.43.161.167 (Dsl), 22a52.Com, Castle Access Inc, Coronado, California, United States, Mail Abuser Malware Controller.
- 199.59.243.109 199.59.243.109 (-), -, -, -, Malware Controller.
- 208.87.35.103 208.87.35.103 (Dsl), Adkix.Com, Secure Hosting Ltd, Nassau, New Providence, Bahamas, Malware Controller.
- 199.59.243.107 199.59.243.107 (-), -, -, -, Malware Controller.
|
- 1:3810007 {tcp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 64770->80
- 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
- 1:9930009 {tcp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
- 1:3810007 {tcp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 53362->80
- 1:3810007 {tcp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 56043->80
|
192.168.1.229
|
3.0 |
VIEW 2 |
- 213.155.14.161 213.155.14.161 (Comp), -, Ossadchy - Osadchiy Yuriy, Ukraine, Malware Controller.
|
- 1:22000032 {tcp} Inbound Attack: ET EXPLOIT LSA exploit MAC_Dst: 00:30:48:30:03:AE; 445<-46689
- 1:22000033 {tcp} Inbound Attack: ET NETBIOS MS04011 Lsasrv.dll RPC exploit (WinXP) MAC_Dst: 00:30:48:30:03:AE; 445<-46689
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-46689
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-669
|
192.168.1.14
|
1.0 |
VIEW 3 |
- 93.63.195.11 93.63.195.11 (Comp), Ip29.Fastwebnet.It, Editcom.It Srl Public Subnet, Rome, Lazio, Italy.
- 180.76.5.171 180.76.5.171 (Dsl), -, Beijing Baidu Netcom Science And Technology Co. Ltd, Beijing, China.
|
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->35524
- 1:552123 (6) {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->35524
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->12651
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->33367
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->8344
|
192.168.1.119
|
0.8 |
VIEW 1 |
|
- 1:22009200 {tcp} Inbound Attack: ET CURRENT_EVENTS Conficker.a Shellcode MAC_Dst: 00:30:48:30:03:AE; 445<-61423
- 1:2001685 {tcp} Egg Download: ET MALWARE Possible Windows executable sent when remote host claims to send an image; 1028<-7776
|
192.168.1.54
|
0.8 |
VIEW 1 |
|
- 1:22009200 {tcp} Inbound Attack: ET CURRENT_EVENTS Conficker.a Shellcode MAC_Dst: 00:30:48:30:03:AE; 445<-1964
- 1:2001685 {tcp} Egg Download: ET MALWARE Possible Windows executable sent when remote host claims to send an image; 1028<-3748
|
192.168.1.134
|
0.8 |
VIEW 1 |
|
- 1:22009200 {tcp} Inbound Attack: ET CURRENT_EVENTS Conficker.a Shellcode MAC_Dst: 00:30:48:30:03:AE; 445<-2261
- 1:2001685 {tcp} Egg Download: ET MALWARE Possible Windows executable sent when remote host claims to send an image; 1028<-3748
|
192.168.1.98
|
1.1 |
VIEW 221 |
|
- 777:7777008 (2) {icmp} Malware Scan: Detected intense malware port scanning of 83 IPs (82 /24s) (# pkts S/M/O/I=0/83/0/0): 445:83
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 85 IPs (84 /24s) (# pkts S/M/O/I=0/85/0/0): 445:85
- 777:7777008 (2) {tcp} Malware Scan: Detected intense malware port scanning of 85 IPs (84 /24s) (# pkts S/M/O/I=0/85/0/0): 445:85
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 90 IPs (89 /24s) (# pkts S/M/O/I=0/90/0/0): 445:90
- 777:7777008 (2) {icmp} Malware Scan: Detected intense malware port scanning of 90 IPs (89 /24s) (# pkts S/M/O/I=0/90/0/0): 445:90
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 95 IPs (94 /24s) (# pkts S/M/O/I=0/95/0/0): 445:95
- 777:7777008 (3) {icmp} Malware Scan: Detected intense malware port scanning of 95 IPs (94 /24s) (# pkts S/M/O/I=0/95/0/0): 445:95
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 99 IPs (98 /24s) (# pkts S/M/O/I=0/99/0/0): 445:99
- 777:7777008 (2) {tcp} Malware Scan: Detected intense malware port scanning of 99 IPs (98 /24s) (# pkts S/M/O/I=0/99/0/0): 445:99
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 105 IPs (104 /24s) (# pkts S/M/O/I=0/105/0/0): 445:105
- 777:7777008 (2) {icmp} Malware Scan: Detected intense malware port scanning of 105 IPs (104 /24s) (# pkts S/M/O/I=0/105/0/0): 445:105
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 109 IPs (108 /24s) (# pkts S/M/O/I=0/109/0/0): 445:109
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 114 IPs (113 /24s) (# pkts S/M/O/I=0/114/0/0): 445:114
- 777:7777008 (2) {tcp} Malware Scan: Detected intense malware port scanning of 114 IPs (113 /24s) (# pkts S/M/O/I=0/114/0/0): 445:114
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 122 IPs (121 /24s) (# pkts S/M/O/I=0/122/0/0): 445:122
- 777:7777008 (2) {icmp} Malware Scan: Detected intense malware port scanning of 122 IPs (121 /24s) (# pkts S/M/O/I=0/122/0/0): 445:122
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 125 IPs (124 /24s) (# pkts S/M/O/I=0/125/0/0): 445:125
- 777:7777008 (2) {icmp} Malware Scan: Detected intense malware port scanning of 125 IPs (124 /24s) (# pkts S/M/O/I=0/125/0/0): 445:125
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 129 IPs (127 /24s) (# pkts S/M/O/I=0/129/0/0): 445:129
- 777:7777008 (2) {tcp} Malware Scan: Detected intense malware port scanning of 129 IPs (127 /24s) (# pkts S/M/O/I=0/129/0/0): 445:129
|
192.168.1.51
|
1.9 |
VIEW 2 |
|
- 1:22000032 {tcp} Inbound Attack: ET EXPLOIT LSA exploit MAC_Dst: 00:30:48:30:03:AE; 445<-3782
- 1:22000033 {tcp} Inbound Attack: ET NETBIOS MS04011 Lsasrv.dll RPC exploit (WinXP) MAC_Dst: 00:30:48:30:03:AE; 445<-3782
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-3782
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-915
|
192.168.1.234
|
1.3 |
VIEW 4 |
|
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 25341->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 25341->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 25341->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 25341->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 25341->22
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 25341->22
- 1:2001219 (2) {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 2991->22
- 1:2001569 {tcp} Outbound Attack: ET SCAN Behavioral Unusual Port NETBIOS traffic, Potential Scan or Infection (60 in 60 secs); 20->139
- 1:2001219 (2) {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 3680->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 132 IPs (4 /24s) (# pkts S/M/O/I=384/2563/2529/0): 22:128, 136:128, 137:128, 138:128, 139:128, 445:128, 559:128, 1025:128, 1433:128, 2067:128, 2100:128, 3127:128, 3306:128, 4445:128, 5000:128, 5554:128, 6129:128, 9996:128, 10000:128, 27374:128, 4350, 6101, 11768
|
192.168.1.141
|
0.8 |
VIEW 1 |
|
- 1:22009200 {tcp} Inbound Attack: ET CURRENT_EVENTS Conficker.a Shellcode MAC_Dst: 00:30:48:30:03:AE; 445<-20596
- 1:2001685 {tcp} Egg Download: ET MALWARE Possible Windows executable sent when remote host claims to send an image; 1028<-7776
|
192.168.1.245
|
1.9 |
VIEW 2 |
|
- 1:22000032 {tcp} Inbound Attack: ET EXPLOIT LSA exploit MAC_Dst: 00:30:48:30:03:AE; 445<-3539
- 1:22000033 {tcp} Inbound Attack: ET NETBIOS MS04011 Lsasrv.dll RPC exploit (WinXP) MAC_Dst: 00:30:48:30:03:AE; 445<-3539
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-3539
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-915
|
192.168.1.41
|
1.6 |
VIEW 34 |
|
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (6 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 54583->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 33090->22
- 1:2003068 (2) {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 38894->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 45166->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 36 IPs (22 /24s) (# pkts S/M/O/I=1/34/1/0): 22:34
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 51976->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 54883->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 36732->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 41 IPs (26 /24s) (# pkts S/M/O/I=0/41/0/0): 22:41
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (8 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 777:7777005 (2) {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (8 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 37590->22
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 38234->22
- 1:2001219 {tcp} Outbound Attack: ET SCAN Potential SSH Scan (20 in 60 secs); 38449->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (9 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
|
192.168.1.102
|
0.8 |
VIEW 2 |
- 195.128.181.52 195.128.181.52 (Dsl), Net.Pl, Eurofux-Wojkowice-Pl, Warsaw, Mazowieckie, Poland, Malware Controller.
- 193.138.229.18 193.138.229.18 (Dsl), As34305.Net, Euroaccess, Eindhoven, Noord-Brabant, Netherlands, Malware Controller Mail Abuser.
|
- 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
|
192.168.1.128
|
0.8 |
VIEW 1 |
|
- 1:22351 {tcp} Inbound Attack: REGISTERED FREE NETBIOS DCERPC ISystemActivator path overflow attempt little endian unicode MAC_Dst: 00:30:48:30:03:AE; 135<-61729
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 4444->61758
|
|
|