Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject: Strange packets
PostPosted: Tue Jun 08, 2004 7:05 am 
Offline
Junior Member

Joined: Thu May 13, 2004 8:08 am
Posts: 27
This morning I noticed that logcheck is sending me huge notification emails.
There are a lot of messages from the kernel. This worries me, so I logged on to Linode's remote console.

Then I saw messages like this, scrolling very quickly on the screen:

Code:
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=3078 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0


If I'm not mistaken, it means that 66.237.60.101 is putting HTTP requests to my server - but very rapidly.

Here's the whois result for 66.237.60.101

Code:
OrgName: XO Communications
OrgID: XOXO
Address: Corporate Headquarters
Address: 11111 Sunset Hills Road
City: Reston
StateProv: VA
PostalCode: 20190-5339
Country: US

ReferralServer: rwhois://rwhois.eng.xo.com:4321/

NetRange: 66.236.0.0 - 66.239.255.255
CIDR: 66.236.0.0/14
NetName: XOX1-BLK-2
NetHandle: NET-66-236-0-0-1
Parent: NET-66-0-0-0-0
NetType: Direct Allocation
NameServer: NAMESERVER1.CONCENTRIC.NET
NameServer: NAMESERVER2.CONCENTRIC.NET
NameServer: NAMESERVER3.CONCENTRIC.NET
NameServer: NAMESERVER.CONCENTRIC.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2002-02-20
Updated: 2003-08-08

OrgAbuseHandle: XCNV-ARIN
OrgAbuseName: XO Communications, Network Violations
OrgAbusePhone: +1-866-285-6208
OrgAbuseEmail: abuse@xo.com

OrgTechHandle: XCIA-ARIN
OrgTechName: XO Communications, IP Administrator
OrgTechPhone: +1-703-547-2000
OrgTechEmail: ipadmin@eng.xo.com

# ARIN WHOIS database, last updated 2004-06-07 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.


Does anyone know what's going on here ?

At the moment I'm trying to restart the server, but it's been 15 minutes and it's not even shut down yet.

Below is a more complete details from the Linode remote console.


Thanks,
Harry

Code:
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=3078 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=65277 DF PROTO=TCP SPT=80 DPT=1638 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=1172 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=1500 TOS=0x00 PREC=0x00 TTL=64 ID=6273 DF PROTO=TCP SPT=80 DPT=4225 WINDOW=6432 RES=0x00 ACK PSH URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=17487 DF PROTO=TCP SPT=80 DPT=4768 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=65277 DF PROTO=TCP SPT=80 DPT=4687 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=63856 DF PROTO=TCP SPT=80 DPT=4668 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=3058 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=17487 DF PROTO=TCP SPT=80 DPT=4406 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=8279 DF PROTO=TCP SPT=80 DPT=2974 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=39887 DF PROTO=TCP SPT=80 DPT=4995 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=3078 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=65277 DF PROTO=TCP SPT=80 DPT=2880 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=1500 TOS=0x00 PREC=0x00 TTL=64 ID=6273 DF PROTO=TCP SPT=80 DPT=4225 WINDOW=6432 RES=0x00 ACK PSH URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=65277 DF PROTO=TCP SPT=80 DPT=4097 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=17487 DF PROTO=TCP SPT=80 DPT=4768 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=65277 DF PROTO=TCP SPT=80 DPT=4687 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=63856 DF PROTO=TCP SPT=80 DPT=4668 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
OUT-internet:IN= OUT=eth0 SRC=66.160.141.215 DST=66.237.60.101 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=3078 WINDOW=6432 RES=0x00 ACK PSH FIN URGP=0
IN-internet:IN=eth0 OUT= MAC=fe:fd:42:a0:8d:d7:00:30:71:f0:1e:53:08:00 SRC=66.7.88.62 DST=66.160.141.215 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=27493 DF PROTO=TCP SPT=2717 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0



Top
   
 Post subject:
PostPosted: Tue Jun 08, 2004 12:17 pm 
Offline
Senior Newbie

Joined: Tue Mar 23, 2004 6:16 pm
Posts: 18
Location: Texas
I've had this happen to me before. I'm using Shorewall as my iptables frontend. I just added the offending IP to the dynamic block list. Shorewall will let me know how many times the IP is being blocked, so I waited until it stopped (a few days usually) then I removed the dynamic block. There is probably some software out there that will do this for you automatically, but that has certain risks as well... so as far as I know you will just have to block the IP manually.

If anyone has any better suggestions please post them.


Top
   
 Post subject:
PostPosted: Tue Jun 08, 2004 11:54 pm 
Offline
Junior Member

Joined: Thu May 13, 2004 8:08 am
Posts: 27
lurkus wrote:
I've had this happen to me before. I'm using Shorewall as my iptables frontend. I just added the offending IP to the dynamic block list. Shorewall will let me know how many times the IP is being blocked, so I waited until it stopped (a few days usually) then I removed the dynamic block. There is probably some software out there that will do this for you automatically, but that has certain risks as well... so as far as I know you will just have to block the IP manually.


Alright... thanks lurkus, I was worried that I did something wrong.


Quote:
If anyone has any better suggestions please post them.


Yes, please do :)


Thanks again,
Harry


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group