Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Reports of a Distributed Injection Scan - SANS Internet Storm Center SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Reports of a Distributed Injection Scan

We have received a report of a large distributed SQL Injection Scan from a reader. Behavior of scan is being reported as 9000+ Unique IPv4 Addresses and sends 4-10 requests to lightly fuzz the form field. Then the next IP will lightly fuzz the second form field within the same page and the next IP the next form field. Looks to be targeting MSSQL and seeking version.

The reader reports that this scan has been going on for several days.

Sample Payload:







The User Agent String for all of the attacking IPs is always

User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)

There does not seem to be a referrer page either.


If you are seeing this activity and can report it please let us know.


Richard Porter

--- ISC Handler on Duty


173 Posts
ISC Handler
Oct 5th 2012
I observed similar activity about a week ago. However in my case there were less than 100 unique source IPs, all belonging to a particular shared hosting provider inside the continental US. The activity continued for about 4 days before stopping.
We seen one occurrence, multiple IP's. Only difference user agent was IE8.


11 Posts
It's turned up in a mass grep of IIS logs.

145 Unique IP Addresses, however they all belong to the same AS allocated to a provider in the US, (I presume the same one as AB mentioned)

Doesn't seem like the injections were successful. Will keep an eye out though.

12 Posts
User-Agents were


12 Posts
We also saw a huge group of attempts at sql injection, while perusing event viewers for last week. All from the same shared hosting provider in Pennsylvania. There were several hundred attempts all with LOONNGG urls with multi "at at version" strings.

6 Posts

Sign Up for Free or Log In to start participating in the conversation!