Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Freaky firewall log

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
Rex Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 08:56 PM
Original message
Freaky firewall log
Saw this pop up on my firewall log today.

Somebody is scanning your computer.
Your computer's UDP ports:
1024, 1026, 1027, and 1029 have been scanned from 34.168.1.34..

First node:

OrgName: Internet Assigned Numbers Authority
OrgID: IANA
Address: 4676 Admiralty Way, Suite 330
City: Marina del Rey
StateProv: CA
PostalCode: 90292-6695
Country: US

NetRange: 192.168.0.0 - 192.168.255.255
CIDR: 192.168.0.0/16
NetName: IANA-CBLK1
NetHandle: NET-192-168-0-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
NameServer: BLACKHOLE-1.IANA.ORG
NameServer: BLACKHOLE-2.IANA.ORG
Comment: This block is reserved for special purposes.
Comment: Please see RFC 1918 for additional information.
Comment:
RegDate: 1994-03-15
Updated: 2002-09-16

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: Internet Corporation for Assigned Names and Number
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org

OrgTechHandle: IANA-IP-ARIN
OrgTechName: Internet Corporation for Assigned Names and Number
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org

# ARIN WHOIS database, last updated 2006-04-04 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.


There is a masked node of *** right before Halliburtion and has no WHOIS.

Backtrace source:

OrgName: Halliburton Company
OrgID: HALLIB-1
Address: 10200 Bellaire Blvd
City: Houston
StateProv: TX
PostalCode: 77072-5299
Country: US

NetRange: 34.0.0.0 - 34.255.255.255
CIDR: 34.0.0.0/8
NetName: HALLIBURTON
NetHandle: NET-34-0-0-0-1
Parent:
NetType: Direct Assignment
NameServer: A4.NSTLD.COM
NameServer: F4.NSTLD.COM
NameServer: G4.NSTLD.COM
NameServer: H4.NSTLD.COM
NameServer: J4.NSTLD.COM
NameServer: L4.NSTLD.COM
Comment:
RegDate: 1991-03-11
Updated: 2004-05-03

OrgAbuseHandle: IAP2-ARIN
OrgAbuseName: IP Abuse POC
OrgAbusePhone: +1-281-575-3000
OrgAbuseEmail: ipabuse@halliburton.com

OrgTechHandle: DNSAD52-ARIN
OrgTechName: DNSADMIN POC
OrgTechPhone: +1-281-575-3000
OrgTechEmail: dnsadmin@halliburton.com

# ARIN WHOIS database, last updated 2006-04-04 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.


It happen as soon as I turned on my PC today after coming home from work.

Anyone know what those ports go to?


Printer Friendly | Permalink |  | Top
markbark Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:06 PM
Response to Original message
1. hurm....
Port 1024 UDP is reserved for future use (i.e is used for nothing now)
Port 1026 UDP is used for Calendar Access Protocol
Port 1027 is unassigned
Port 1029 is used for solid-mux (whatever that is)

All these can be looked up from http://www.iana.org/assignments/port-numbers

I'm also puzzled as to why anyone would scan the 192.168.x.x subnet.
Those are RFC1918 numbers -- reserved for private use and as such, utterly unroutable. Most properly configured internet routers with happily drop them, so scanning anything in RFC 1918 space is an exercise in futility (unless one is scanning one's own private network)

Go figure...


--MAB
Printer Friendly | Permalink |  | Top
 
Rex Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:13 PM
Response to Reply #1
3. Thanks!
Weird, I will check out solid-mux to see that that does.
Printer Friendly | Permalink |  | Top
 
BlooInBloo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:14 PM
Response to Reply #3
4. Can your firewall stealth all unused ports?
ZoneAlarm can - lots can, for that matter...
Printer Friendly | Permalink |  | Top
 
waiting for hope Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:06 PM
Response to Original message
2. delete
Edited on Tue Apr-04-06 09:14 PM by waiting for hope
Printer Friendly | Permalink |  | Top
 
BattyDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:16 PM
Response to Original message
5. All four of those ports are known trojan ports.
Edited on Tue Apr-04-06 09:16 PM by BattyDem
That doesn't necessarily mean that it is trojan activity, but you should definitely scan your computer for spyware using Ad-Aware and/or SpyBot. Both are free.

Get Ad-Aware here; http://www.lavasoftusa.com/
Get SpyBot here: http://www.safer-networking.org/



Get more info about the ports at these sites:

http://www.simovits.com/sve/nyhetsarkiv/1999/nyheter9902.html
http://www.my-proxy.com/content/Security%20Tech/The%20Well-known%20Trojan%20Ports.html
http://www.auditmypc.com/port/tcpudp-14.asp



On edit: Also, update your virus program and scan your system.

Printer Friendly | Permalink |  | Top
 
lpbk2713 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-04-06 09:25 PM
Response to Original message
6. Test your firewall here .....


Link: http://www.hackerwatch.org/probe/


If you're behind a router and have a software firewall in addition you probably have nothing to worry about.



Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Dec 26th 2024, 05:39 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC