These are Nimba and Code Red scan. You are ok but to count and ban all IPs trying to scan your http header, use the script below:
Pico filename and insert script below the chmod to root and execute, it will print to a file all offending IPs. ---Script Starts HERE--- #!/bin/sh echo "Nimba worm scanner..." echo "Checking for root.exe and cmd.exe entries..." #count individual scans: INDIVIDUAL_SCANS1=`grep -c 'cmd.exe' /var/log/httpd/access | wc -l` INDIVIDUAL_SCANS2=`grep -c 'root.exe' /var/log/httpd/access | wc -l` INDIVIDUAL_SCANS3=`grep -c 'NNNNNNNNNN' /var/log/httpd/access | wc -l` INDIVIDUAL_SCANS4=`grep -c 'XXXXXXXXXX' /var/log/httpd/access | wc -l` #count unique source ips: UNIQUE1=`grep 'cmd.exe' /var/log/httpd/access| cut -d ' ' -f2 | sort -u |wc -l` UNIQUE2=`grep 'root.exe' /var/log/httpd/access| cut -d ' ' -f2 | sort -u | wc -l` UNIQUE3=`grep 'NNNNNNNNNN' /var/log/httpd/access| cut -d ' ' -f2 | sort -u | wc -l` UNIQUE4=`grep 'XXXXXXXXXX' /var/log/httpd/access| cut -d ' ' -f2 | sort -u | wc -l` ecgo "NIMDA Scans:" echo "We have received $INDIVIDUAL_SCANS1 scans for root.exe from $UNIQUE1 different IP addresses" echo "We have received $INDIVIDUAL_SCANS2 scans for cmd.exe from $UNIQUE2 different IP addresses" echo "Code Red Scans:" echo "We have received $INDIVIDUAL_SCANS3 scans for Coded Red \"N\" from $UNIQUE3 different IP addresses" echo "We have received $INDIVIDUAL_SCANS4 scans for Coded Red \"X\" from $UNIQUE4 different IP addresses" ---Script Ends HERE--- Al-Juhani [EMAIL PROTECTED] >===== Original Message From [EMAIL PROTECTED] ===== > >-----Original Message----- >From: [EMAIL PROTECTED] [mailto:redhat-list-admin@;redhat.com] >On Behalf Of Daevid Vincent >Sent: Friday, October 25, 2002 8:15 PM >To: [EMAIL PROTECTED] >Subject: Is this a hack attempt? > > >I run RH8.0 so this sure seems suspicious to me: > >1-0 25065 0/508/508 _ 6.42 128 0 0.0 130.31 130.31 12.237.249.145 >daevid.com GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0 > >4-0 25068 0/519/519 _ 5.86 139 0 0.0 143.76 143.76 12.237.249.145 >daevid.com GET /MSADC/root.exe?/c+dir HTTP/1.0 >5-0 25069 0/518/518 _ 5.84 142 0 0.0 99.62 99.62 12.237.249.145 >daevid.com GET /scripts/root.exe?/c+dir HTTP/1.0 >6-0 25070 0/531/531 _ 6.44 114 0 0.0 129.48 129.48 12.237.249.145 >daevid.com GET >/msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../.. >7-0 25071 0/525/525 _ 6.93 117 0 0.0 139.17 139.17 12.237.249.145 >daevid.com GET >/_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd. >8-0 25214 0/503/503 _ 5.83 136 0 0.0 118.91 118.91 12.237.249.145 >daevid.com GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0 >9-0 25774 0/271/271 _ 4.87 133 0 0.0 119.94 119.94 12.237.249.145 >daevid.com GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0 >10-0 26526 0/457/457 _ 5.36 335 0 0.0 100.78 100.78 12.229.31.145 >daevid.com GET /MSADC/root.exe?/c+dir HTTP/1.0 >14-0 26531 0/334/334 _ 3.51 119 0 0.0 89.96 89.96 12.237.249.145 >daevid.com GET >/_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd. > >And so now is there a way I can make a file of IP/domains that are >banned from contacting my server (all ports)? > -- redhat-list mailing list unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list