Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Wed Feb 22, 2006 12:52 am 
Offline
Senior Member

Joined: Thu Apr 08, 2004 3:24 pm
Posts: 92
ICQ: 3765104
Website: http://www.unixfool.com
Yahoo Messenger: wigglit2001@yahoo.com
Location: VA
I installed a firewall with logging implemented tonight. When I did a cursory check of the logs, I saw an IP that looked very similar to my own Linode IP, and when I did a whois, it resolved to HE. I'll not post the IP.

The IP in question was trying to connect via port 135, which is related to epmap services (I'll look that up later).

I'm wondering if this is regular activity. Since I don't normally scrutinize traffic from/to my Linode beyond periodical tcpdumps, I'm a bit aloof here.


Top
   
 Post subject:
PostPosted: Wed Feb 22, 2006 10:32 am 
Offline
Senior Member
User avatar

Joined: Wed Mar 17, 2004 12:35 am
Posts: 118
Website: http://www.necrobones.com/
Location: Sterling, VA
Interesting. Port 135 is also associated with a Windows DCOM RPC exploit. The Blaster worm is an example of something that took advantage of it. Odd that you'd be seeing probes from a linode on that port.

_________________
----
Ed/Bones.


Top
   
 Post subject:
PostPosted: Wed Feb 22, 2006 1:16 pm 
Offline
Senior Member

Joined: Thu Apr 08, 2004 3:24 pm
Posts: 92
ICQ: 3765104
Website: http://www.unixfool.com
Yahoo Messenger: wigglit2001@yahoo.com
Location: VA
Yeah, I also thought this. Below is what I saw (but I'll X out my IP):

Feb 21 23:42:58 starchild kernel: Connection attempt (PRIV): IN=eth0 OUT= MAC=fe:fd:42:a0:8d:1e:00:b0:4a:6c:76:53:08:00 SRC=66.160.179.133 DST=XX.XXX.XXX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=9883 DF PROTO=TCP SPT=1841 DPT=135 WINDOW=64240 RES=0x00 SYN URGP=0

Resolves to:

66.160.179.133

Blacklist Status: Clear
Record Type: IP Address
IP Location: United States - California - San Jose - Cooplabs Inc
Reverse IP: No websites hosted using this IP address
Reverse DNS: cust-66-160-179-133.static.pcwi.net


--------------------------------------------------------------------------------
Hurricane Electric HURRICANE-7 (NET-66-160-128-0-1)
66.160.128.0 - 66.160.207.255
Cooplabs Inc HURRICANE-CE1505-491 (NET-66-160-179-0-1)
66.160.179.0 - 66.160.179.255

I'm wondering if this is a non-Linode HE device.


Top
   
 Post subject:
PostPosted: Wed Feb 22, 2006 4:39 pm 
Offline
Senior Member
User avatar

Joined: Fri Oct 24, 2003 3:51 pm
Posts: 965
Location: Netherlands
Cooplabs is an ISP based in San Jose, where HE has a large facility. The RDNS points to Pacific Coast Wireless Internet, whose coverage area is just south-east of San Jose. HE probably supply connectivity to these people.

_________________
/ Peter


Top
   
 Post subject:
PostPosted: Wed Feb 22, 2006 11:04 pm 
Offline
Senior Member

Joined: Thu Apr 08, 2004 3:24 pm
Posts: 92
ICQ: 3765104
Website: http://www.unixfool.com
Yahoo Messenger: wigglit2001@yahoo.com
Location: VA
Feb 22 22:00:20 starchild kernel: Blocked hosts violation: IN=eth0 OUT= MAC=fe:fd:42:a0:8d:1e:00:b0:4a:6c:76:53:08:00 SRC=66.160.179.133 DST=XX.XXX.XXX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=56908 DF PROTO=TCP SPT=4033 DPT=445 WINDOW=64240 RES=0x00 SYN URGP=0

Seening port 445 traffic now. Of course, I blocked the IP not long ago.

pclissold, thanks for pointing out that this isn't some host at the HE facility.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group