>       maybe nmap with the decoy option
> 
>   -Ddecoy_host1,decoy2,ME,decoy3[,...] Launch scans from decoy host

> > Sep 23 03:56:22 <> list 100 denied tcp 216.xx.xx.66(47850) ->
> > 203.xx.xx.201(23), 1 packet
> > Sep 23 03:56:23 <> list 100 denied tcp 216.xx.xx.66(47850) ->
> > 203.xx.xx.253(23), 1 packet
> > Sep 23 03:56:23 <> list 100 denied tcp 216.xx.xx.66(47850) ->
> > 203.xx.xx.254(23), 1 packet

Wouldn't that be `nmap -DME`?  ;-)

The source is always the same ("216.xx.xx.66"), but the
destination is all over the 203.xx.xx.0/24 subnet, always
going to port 23.  Someone's looking for telnet servers
and not being very stealthy.


~Patrick
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to