What about these packets?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



two rules in my INPUT chains are:
-A INPUT -s 63.110.21.51 -m state --state NEW -j LOG --log-prefix
"PLAYNC_NEW " --log-level debug
-A INPUT -s 63.110.21.51 -m state --state NEW -j DROP

My router is keeping the following logs

Jan 28 18:32:46 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=1 ID=775 PROTO=UDP SPT=14339
DPT=33438 LEN=12
Jan 28 18:32:46 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=1 ID=1031 PROTO=UDP SPT=14339
DPT=33440 LEN=12
Jan 28 18:32:51 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=2 ID=776 PROTO=UDP SPT=14339
DPT=33438 LEN=12
Jan 28 18:32:51 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=2 ID=1032 PROTO=UDP SPT=14339
DPT=33440 LEN=12
Jan 28 18:32:56 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=2 ID=776 PROTO=UDP SPT=14339
DPT=33438 LEN=12
Jan 28 18:32:56 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=2 ID=1032 PROTO=UDP SPT=14339
DPT=33440 LEN=12
Jan 28 18:33:01 stingray kernel: PLAYNC_NEW IN=eth0 OUT=
MAC=00:c0:26:63:47:f5:00:90:1a:40:a2:9f:08:00 SRC=63.110.21.51
DST=x.x.x.x LEN=32 TOS=0x00 PREC=0x20 TTL=3 ID=777 PROTO=UDP SPT=14339
DPT=33438 LEN=12


I have replace my original ip with x.x.x.x
What can I say about these packets?
Please let me learn more details about this packet.

MOhammad





[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux