Re: How to identify unrefered IP address

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu Jul 06 2000 at 07:34, Edouard Soriano wrote:

> We have set up a Firewall based on Linux. Since several days there are
> some IP address trying to enter
> using telnet.
> 
> One of them was found using nslookup. We sent a warning message to the
> ISP manager and they stopped.
> 
> But the other is trying like crazy requesting telnet who are rejected by
> the security rules.
> 
> This address in unknowed by nslookup.

I see this sometimes several times every day.  Just let those
packets be REJECTED or DENIED (probably better as rejects with icmp
replies, but your call).

> Any idea about how to catch this #@]|]]!! unfair person ?

My advice is to ignore it, it's not your problem eh?  :)

But you are asking about doing reverse lookups....

	$ $ nslookup 213.136.129.253
	Server:  dns.growzone.com.au
	Address:  202.9.32.1

	*** dns.growzone.com.au can't find 213.136.129.253: Non-existent host/domain

That should look familiar :)

Try a lookup on the nameserver for the in-addr.arpa reverse zone:

	$ nslookup -q=ns 129.136.213.in-addr.arpa
	Server:  dns.growzone.com.au
	Address:  202.9.32.1

	*** dns.growzone.com.au can't find 129.136.213.in-addr.arpa: Non-existent host/domain

Often that works, and bingo - you know who "owns" the IP range that
the packet originated from (that is, if it hasn't been spoofed).

If this fails, all it means is that it hasn't been allocated in the
(reverse) DNS records of the nameserver that is authorative for
that particular C class network.

Try looking for the nameserver further up the delegation tree...

	$ nslookup -q=ns 136.213.in-addr.arpa
	Server:  dns.growzone.com.au
	Address:  202.9.32.1

	Authoritative answers can be found from:
	213.IN-ADDR.ARPA
		origin = ns.ripe.net
		mail addr = ops.ripe.net
		serial = 2000070603
		refresh = 43200 (12H)
		retry   = 7200 (2H)
		expire  = 1209600 (2W)
		minimum ttl = 7200 (2H)

My example here works at this point to give some useful information,
but if even this doesn't course of last resort is to do a
traceroute, at least you can get some idea where it is originated
from.

If you are REALLY curious, it is often possible to see what sort of
box that is trying to get in.  cheops is a very nice GUI-like tool,
but I've found it to be unstable when used on boxes with complex
local network setups (like running two networks on the same physical
wire).

Netcat (/usr/bin/nc) is perfect for doing some very quick port
scanning....

	$ nc -v 213.136.129.253 -z 1-200
	(UNKNOWN) [213.136.129.253] 139 (netbios-ssn) : No route to host
	(UNKNOWN) [213.136.129.253] 138 (netbios-dgm) : No route to host
	(UNKNOWN) [213.136.129.253] 137 (netbios-ns) : No route to host
	(UNKNOWN) [213.136.129.253] 53 (domain) open
	(UNKNOWN) [213.136.129.253] 25 (smtp) open
	(UNKNOWN) [213.136.129.253] 22 (ssh) open

Use whatever port range you are interested in... if a port is open,
then you'll get a response.  And as you can seee, it is very
interesting what you do find (in this case it is almost certainly a
unix box...  :)

Cheers
Tony
-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@vger.rutgers.edu


[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux