RE: lots of ACKs for DPT=1433

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>From the details you gave , it would be natural to assume you are talking about multiple sources sending traffic
to your Internet exposed IP's which would normally be some version of PORTSCANNING .
( Even if the packets are 90%-100% ACK packets , they can still be some attempt of portscanning )

In any case it would be helpful if you add some complete logfiles entries (10-20) , 
if you need you can just "MANGLE" your exposed IP's target but please leave the rest of the logfiles as original as possible .


Best regards
André Paulsberg-Csibi
Senior Network Engineer 
Fault Handling
IBM Services AS
andre.paulsberg-csibi@xxxxxxxx
M +47 9070 5988




-----Original Message-----
From: netfilter-owner@xxxxxxxxxxxxxxx [mailto:netfilter-owner@xxxxxxxxxxxxxxx] On Behalf Of Olaf Zaplinski
Sent: 8. august 2016 10:16
To: netfilter@xxxxxxxxxxxxxxx
Subject: Re: lots of ACKs for DPT=1433

Am 2016-08-07 17:29, schrieb Rob Sterenborg (Lists):
> On 04-08-16 12:46, Olaf Zaplinski wrote:
>> Hi,
>> 
>> I see lots of ACKs for DPT=1433 in my logs. Anyone else?
>> 
>> Any idea what is the reason for this?
>> 
>> Olaf
> 
> A lot of scans for a vulnerable MSSQL server.

That would be true if that were SYN requests. But 90% of these requests 
or so are ACK requests.

Olaf
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux