Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.




1463 posts

Uber Geek

Trusted

# 223507 3-Oct-2017 03:43
Send private message

Just trawling through my firewall logs this evening... as ya do... and I noticed a kackload of port scans appearing to be sourced from 202.162.73.2, which resolves to www.trademe.co.nz.


Digging deeper, it turns out I've been getting at least 1000 ports scanned daily from this IP since as far back as Dec 2016!


The scans are of seemingly random ports appearing to range from 1024 to 65536, some of which are repeat scans on the same ports.


 


Has anyone seen anything like this before?  I'll probably report this to Trademe as to my eye this looks like a compromised host, but I figured I'd run it past you guys first in case anyone can think of another explanation.


 


All reasonable hypothesis considered!


View this topic in a long page with up to 500 replies per page Create new topic
 1 | 2


1463 posts

Uber Geek

Trusted

  # 1880528 10-Oct-2017 18:48
Send private message

Anyone?


/dev/null
9028 posts

Uber Geek

Moderator
Trusted
Lifetime subscriber

  # 1880530 10-Oct-2017 18:55
Send private message

To be honest I don't think it is a "port scan" in such. Many firewalls will alert "portscan" for normal activity.





 
 
 
 




1463 posts

Uber Geek

Trusted

  # 1880533 10-Oct-2017 18:59
Send private message

 Naa, this IP is attempting to connect to thousands of ports, I can see the individual attempts in my firewall activity reports.


3885 posts

Uber Geek

Subscriber

  # 1880674 10-Oct-2017 23:35
One person supports this post

Im assuming that you have a static IP. Any idea what type of packets you are receiving? TCP SYN packets for example? Wild guess is that someone at Trademe is running a VPN client, and they have mistakenly configured your IP as the server address.

 

Note as well that the source IP may be spoofed. So there is a possibility that this might be nothing to do with Trademe.






'That VDSL Cat'
11525 posts

Uber Geek

Trusted
Spark
Subscriber

  # 1880679 10-Oct-2017 23:50
Send private message

Aredwood:

 

Note as well that the source IP may be spoofed. So there is a possibility that this might be nothing to do with Trademe.

 

 

My suspensions too. 

 

 

 

Checking both my VF and Spark connections, no unsolicited traffic from that ip.





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.




1463 posts

Uber Geek

Trusted

  # 1880685 11-Oct-2017 00:06
Send private message

Aredwood:

 

Im assuming that you have a static IP. Any idea what type of packets you are receiving? TCP SYN packets for example? Wild guess is that someone at Trademe is running a VPN client, and they have mistakenly configured your IP as the server address.

 

 

Nope, dynamic IP.  Not sure about packet type, but here's the log entries for the last hour.  It sure doesn't look like normal VPN traffic to me!

 

 

2017:10:10-23:41:27 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44717" tcpflags="RST"
2017:10:10-23:41:27 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44714" tcpflags="RST"
2017:10:10-23:41:59 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44775" tcpflags="RST"
2017:10:10-23:41:59 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44772" tcpflags="RST"
2017:10:10-23:43:03 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44884" tcpflags="RST"
2017:10:10-23:43:35 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="44932" tcpflags="RST"
2017:10:10-23:44:39 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45025" tcpflags="RST"
2017:10:10-23:44:39 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45023" tcpflags="RST"
2017:10:10-23:45:42 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45115" tcpflags="RST"
2017:10:10-23:46:15 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45159" tcpflags="RST"
2017:10:10-23:46:47 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45198" tcpflags="RST"
2017:10:10-23:46:47 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45196" tcpflags="RST"
2017:10:10-23:47:19 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45259" tcpflags="RST"
2017:10:10-23:47:19 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45257" tcpflags="RST"
2017:10:10-23:48:23 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45362" tcpflags="RST"
2017:10:10-23:48:55 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45403" tcpflags="RST"
2017:10:10-23:49:59 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45502" tcpflags="RST"
2017:10:10-23:50:31 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45565" tcpflags="RST"
2017:10:10-23:51:35 PhatWall ulogd[2812]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:1d:aa:8a:8c:60" dstmac="00:1a:8c:4c:17:c9" srcip="202.162.73.2" dstip="192.168.1.1" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="80" dstport="45664" tcpflags="RST"

 

 

 

 

Aredwood:

 

Note as well that the source IP may be spoofed. So there is a possibility that this might be nothing to do with Trademe.

 

 

I guess it could be, but I'm not sure why you would run a port scan when you can't see the results...


463 posts

Ultimate Geek


  # 1883107 13-Oct-2017 18:20
Send private message

A TTL of 254 mean these packets didn't come across the Internet and were probably generated by your upstream NAT Gateway.

 

Two likely scenarios I can think of.

 

1. You've got a firewall rule blocking trademe on that NAT GW and it's set to "reject" rather than "drop". The firewall may spoof a TCP RST (tcpflags="RST" in your trace) in this case.

 

2. The NAT GW is timing out long lived TCP connections from it's state table, and sending a helpful TCP reset to the client to let it know the connection will no longer work.

 

 

 

BTW: There is a type of port scan that spoofs the source IP, called a blind or idle port scan. It works even if the attacker doesn't see the response.


 
 
 
 




1463 posts

Uber Geek

Trusted

  # 1883113 13-Oct-2017 18:35
Send private message

hashbrown:

 

A TTL of 254 mean these packets didn't come across the Internet and were probably generated by your upstream NAT Gateway.

 

 

Well, my upstream VDSL router is forwarding all packets to my firewall so that would explain that.

 

 

 

hashbrown:

 

Two likely scenarios I can think of.

 

1. You've got a firewall rule blocking trademe on that NAT GW and it's set to "reject" rather than "drop". The firewall may spoof a TCP RST (tcpflags="RST" in your trace) in this case.

 

2. The NAT GW is timing out long lived TCP connections from it's state table, and sending a helpful TCP reset to the client to let it know the connection will no longer work.

 

 

Ther are no firewall blocking rules of any kind on the NAT GW, it's completely open and forwarding everything to the firewall.

 

Maybe, but that still doesn't explain what's generating the connections in the first place to this massive range of ports?  Plus the source is showing as trademe.

 

Also, this is only showing up as traffic from trademe and no other site.


1423 posts

Uber Geek


  # 1883120 13-Oct-2017 19:25
Send private message

Was anyone behind your firewall browsing trademe during those times in the timestamps?

 

 

What ISP? (this sort of stuff happened in the transparent proxy days)



1463 posts

Uber Geek

Trusted

  # 1883124 13-Oct-2017 19:37
Send private message

Sure, there's usually some trademe access during the day, but not that consistently and for that long.  These events are happening on a pretty consistent basis (every 30-90 seconds) and for 11-24hrs a day solid.

ISP is 2Degrees.


3885 posts

Uber Geek

Subscriber

  # 1883228 14-Oct-2017 02:30

What happens if you get a different dynamic IP?








1463 posts

Uber Geek

Trusted

  # 1883230 14-Oct-2017 03:39
Send private message

This has been going on since Dec 2016 so it seems to span IPs at least.  I do have a DDNS domain however.

 

I haven't observed it at the time of getting a new IP however.


463 posts

Ultimate Geek


  # 1883235 14-Oct-2017 07:02
One person supports this post
Send private message

SamF:

 

Maybe, but that still doesn't explain what's generating the connections in the first place to this massive range of ports?  Plus the source is showing as trademe.

 

Also, this is only showing up as traffic from trademe and no other site.

 

 

There isn't really a maybe here.  Each router decrements the TTL by 1 and the maximum TTL is 255.  For the TTL to be 254 whatever generated those packets is no more than one hop away. i.e. on your network.  Whether or not the source IP is trademe, that packet didn't traverse the Internet.

 

There also isn't a massive range of ports.  The trace indicates these are replies to connections from your network on port 80, the standard web port. Your systems use a new high port for each new connection, which is how TCP works.

 

My guess is something like the trademe mobile app generates long-lived idle connections that your NAT GW is timing out.  If you want more insight, create a firewall rule that logs the detail of all connections outbound to that IP. Then map the source ports of those connections to the destination ports of the TCP resets.  

 

If I were making a longer list of scenarios here, your network being used to hack trademe would make more sense than vice-versa.  Trademe hacking you with a long running port scan would sit a couple of entries above "Aliens!".




1463 posts

Uber Geek

Trusted

  # 1883348 14-Oct-2017 12:42
Send private message

Hmm, yes, you make a very good point.  The TTL is really the key in this case isn't it.

 

Looking at it that way your theory certainly makes sense.  I'm still finding it hard to believe that anything on my side would be initiating that many connections to TM, but I guess as you pointed out, in the ranking of probabilities it's more likely than TM being the source.

 

I'll setup a trace on outgoing connections to TM and see what comes up.

Thanks for taking the time to explain all that, I appreciate it.


1423 posts

Uber Geek


  # 1883354 14-Oct-2017 12:54
Send private message

254 TTL could also be the ISP first hop... so it could be your ISP sending you unsolicited traffic?

 

 

I agree though it is more likely something your end or false positive with Trademe's TCP setup.

 1 | 2
View this topic in a long page with up to 500 replies per page Create new topic



Switch your broadband provider now - compare prices


Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Netflix releases 21 Studio Ghibli works
Posted 22-Jan-2020 11:42


Vodafone integrates eSIM into device and wearable roadmap
Posted 17-Jan-2020 09:45


Do you need this camera app? Group investigates privacy implications
Posted 16-Jan-2020 03:30


JBL launches headphones range designed for gaming
Posted 13-Jan-2020 09:59


Withings introduces ScanWatch wearable combining ECG and sleep apnea detection
Posted 9-Jan-2020 18:34


NZ Police releases public app
Posted 8-Jan-2020 11:43


Suunto 7 combine sports and smart features on new smartwatch generation
Posted 7-Jan-2020 16:06


Intel brings innovation with technology spanning the cloud, network, edge and PC
Posted 7-Jan-2020 15:54


AMD announces high performance desktop and ultrathin laptop processors
Posted 7-Jan-2020 15:42


AMD unveils four new desktop and mobile GPUs including AMD Radeon RX 5600
Posted 7-Jan-2020 15:32


Consolidation in video streaming market with Spark selling Lightbox to Sky
Posted 19-Dec-2019 09:09


Intel introduces cryogenic control chip to enable quantum computers
Posted 10-Dec-2019 21:32


Vodafone 5G service live in four cities
Posted 10-Dec-2019 08:30


Samsung Galaxy Fold now available in New Zealand
Posted 6-Dec-2019 00:01


NZ company oDocs awarded US$ 100,000 Dubai World Expo grant
Posted 5-Dec-2019 16:00



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Support Geekzone »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.