BotHunter ®
Live Internet Monitor Page
Computer Science Laboratory
SRI International
Last Updated: Wed Jul 3 23:00:05 2013
|
|

|
|
Victim IP
|
Max Score
|
Profiles
|
CCs
|
Events
|
192.168.1.212
|
0.8 |
VIEW 1 |
|
- 1:22514 (2) {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-3314
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 1022->3331
|
192.168.1.36
|
0.8 |
VIEW 21 |
- 69.43.161.167 69.43.161.167 (Dsl), 22a52.Com, Castle Access Inc, Coronado, California, United States, Mail Abuser Malware Controller.
|
- 1:9930020 {udp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
- 1:9930009 {tcp} Bot Space Access: ET ShadowServer confirmed botnet control server on non-standard port
|
192.168.1.151
|
0.8 |
VIEW 1 |
- 122.225.217.191 122.225.217.191 (Dsl), Hz.Zj.Cn, Chinanet Zhejiang Province Network, Beijing, China.
|
- 1:9910002 {udp} Bot Space Access: BOTHUNTER CURRENT_EVENTS Excessive NXDOMAIN responses by internal host; 13010<-53
|
192.168.1.85
|
1.0 |
VIEW 1 |
- 66.249.74.230 66.249.74.230 (Dial), Google.Com, Google Inc, Cabot, Arkansas, United States.
|
- 1:2002033 {tcp} C&C Communication: ET TROJAN BOT - potential response; 80->34405
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->18400
- 1:552123 (3) {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 80->44595
|
192.168.1.158
|
1.6 |
VIEW 3 |
|
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 12 IPs (12 /24s) (# pkts S/M/O/I=0/12/0/3): 445:12
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/21/0/3): 445:21
- 1:52000046 {tcp} Outbound Attack: ET NETBIOS MS04011 Lsasrv.dll RPC exploit (Win2k); 1263->445
- 1:52314 (6) {tcp} Outbound Attack: GPL SHELLCODE x86 0x90 NOOP unicode; 1270->445
- 1:52514 (3) {tcp} Outbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt; 1263->445
- 777:7777008 {icmp} Malware Scan: Detected intense malware port scanning of 366 IPs (364 /24s) (# pkts S/M/O/I=0/200/6/200): 445:200
|
192.168.1.164
|
3.0 |
VIEW 2 |
- 213.155.14.161 213.155.14.161 (Comp), -, Ossadchy - Osadchiy Yuriy, Ukraine, Malware Controller.
|
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-3044
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-2256
- 1:2003070 {tcp} C&C Communication: ET WORM Korgo.U Reporting, [/index.php?id=hooevknosf&scn=4&inf=0&ver=19&cnt=USA]; 1056->80
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 11 IPs (11 /24s) (# pkts S/M/O/I=0/10/1/0): 445:10
|
192.168.1.114
|
1.9 |
VIEW 2 |
|
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-4071
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-2256
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 11 IPs (11 /24s) (# pkts S/M/O/I=0/10/1/0): 445:10
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 21 IPs (21 /24s) (# pkts S/M/O/I=0/20/1/0): 445:20
|
192.168.1.234
|
0.8 |
VIEW 1 |
|
- 1:22514 (2) {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-4763
- 1:552123 {tcp} Outbound Attack: REGISTERED FREE ATTACK-RESPONSES Microsoft cmd.exe banner; 1022->4813
|
192.168.1.190
|
3.0 |
VIEW 2 |
- 213.155.14.161 213.155.14.161 (Comp), -, Ossadchy - Osadchiy Yuriy, Ukraine, Malware Controller.
|
- 1:22514 {tcp} Inbound Attack: GPL NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt MAC_Dst: 00:30:48:30:03:AE; 445<-4975
- 1:3300004 {tcp} Egg Download: BotHunter HTTP-based .exe Upload on backdoor port; 1031<-4849
- 1:2003070 {tcp} C&C Communication: ET WORM Korgo.U Reporting, [/index.php?id=oxabesfbkvrsqwx&scn=0&inf=0&ver=19&cnt=USA]; 1032->80
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 11 IPs (11 /24s) (# pkts S/M/O/I=0/10/1/0): 445:10
|
192.168.1.102
|
1.3 |
VIEW 35 |
- 71.114.134.16 71.114.134.16 (Dsl), Verizon.Net, Verizon Internet Services Inc, York, Pennsylvania, United States.
- 96.237.24.205 96.237.24.205 (Dsl), Verizon.Net, Verizon Internet Services Inc, Lowell, Massachusetts, United States.
- 36.224.39.189 36.224.39.189 (-), -, -, -.
- 36.224.35.237 36.224.35.237 (-), -, -, -.
- 31.162.190.58 31.162.190.58 (-), -, -, -.
- 192.183.234.162 192.183.234.162 (-), -, -, -.
- 111.250.41.151 111.250.41.151 (Dsl), Sterlingstudents.Net, Chtd Chunghwa Telecom Co. Ltd, Taipei, T'Ai-Pei, Taiwan.
- 118.160.221.150 118.160.221.150 (Dsl), Hinet.Net, Chunghwa Telecom Data Communication Business Group, Taipei, T'Ai-Pei, Taiwan.
- 66.86.12.146 66.86.12.146 (Dsl), Qwest.Net, Qwest Broadband Services Inc, Denver, Colorado, United States.
- 50.102.167.203 50.102.167.203 (-), -, -, -.
- 79.100.2.21 79.100.2.21 (Dsl), 79-100-4-10.Btc-Net.Bg, Btc Broadband Service, Sofia, Sofiya, Bulgaria.
- 68.236.124.193 68.236.124.193 (Dsl), Verizon.Net, Verizon Internet Services Inc, Boston, Massachusetts, United States.
- 79.189.39.181 79.189.39.181 (Comp), Tpnet.Pl, Customer-Idsl, Poland.
- 202.150.208.75 202.150.208.75 (Comp), Ne.Com.Sg, Linqingping, Singapore, Singapore, Malware Controller Mail Abuser.
- 83.12.227.212 83.12.227.212 (Comp), Tpnet.Pl, Customer-Idsl, Gdynia, Pomorskie, Poland.
- 71.99.19.40 71.99.19.40 (Dsl), Verizon.Net, Verizon Internet Services Inc, Pinellas Park, Florida, United States.
- 180.155.136.55 180.155.136.55 (Dsl), Davita.Com, Chinanet Shanghai Province Network, Beijing, China.
- 71.126.50.70 71.126.50.70 (Dsl), Verizon.Net, Verizon Internet Services Inc, Bridgewater, Massachusetts, United States.
- 71.110.198.240 71.110.198.240 (Dsl), Verizon.Net, Verizon Internet Services Inc, Redlands, California, United States.
- 71.178.132.129 71.178.132.129 (Dsl), Verizon.Net, Verizon Internet Services Inc, Washington, District Of Columbia, United States.
- 114.41.86.118 114.41.86.118 (Dsl), Hinet.Net, Chunghwa Telecom Data Communication Business Group, Taipei, T'Ai-Pei, Taiwan.
- 114.42.77.209 114.42.77.209 (Dsl), Hinet.Net, Chunghwa Telecom Data Communication Business Group, Taipei, T'Ai-Pei, Taiwan.
- 95.51.207.89 95.51.207.89 (Dsl), Tpnet.Pl, Tpsa, Poland.
- 101.80.23.169 101.80.23.169 (-), -, -, -.
- 114.36.182.243 114.36.182.243 (Dsl), Hinet.Net, Chunghwa Telecom Data Communication Business Group, Taipei, T'Ai-Pei, Taiwan.
- 178.60.156.189 178.60.156.189 (Dsl), Hoodpackaging.Com, Eu-Zz, United Kingdom.
- 71.116.253.221 71.116.253.221 (Dsl), Verizon.Net, Verizon Internet Services Inc, North Hills, California, United States.
- 27.153.176.33 27.153.176.33 (-), -, -, -.
|
- 1:9910002 {udp} Bot Space Access: BOTHUNTER CURRENT_EVENTS Excessive NXDOMAIN responses by internal host; 47113<-53
- 1:2002910 {tcp} Outbound Attack: ET SCAN Potential VNC Scan 5800-5820; 54011->5802
- 1:2002910 {tcp} Outbound Attack: ET SCAN Potential VNC Scan 5800-5820; 59856->5802
- 1:3810008 {udp} Russian Business Network: ET Known Russian Business Network Monitored Domain; 47113->53
|
192.168.1.41
|
1.6 |
VIEW 21 |
|
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (6 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 34776->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 40973->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 60194->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 54305->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 43 IPs (25 /24s) (# pkts S/M/O/I=0/43/0/0): 22:43
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (10 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 39576->22
- 777:7777008 {tcp} Malware Scan: Detected intense malware port scanning of 44 IPs (26 /24s) (# pkts S/M/O/I=0/43/1/0): 22:43
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 39802->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 11 IPs (11 /24s) (# pkts S/M/O/I=0/10/1/0): 22:10
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 40620->22
- 1:2003068 {tcp} Outbound Attack: ET SCAN Potential SSH Scan OUTBOUND; 40845->22
- 777:7777005 {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (9 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
- 777:7777005 (2) {tcp} Outbound Scan: Detected moderate malware port scanning of 10 IPs (9 /24s) (# pkts S/M/O/I=0/10/0/0): 22:10
|
|
|