On Fri, Jan 20, 2012 at 5:32 PM, Grant <emailgr...@gmail.com> wrote:
>>> >> My firewall is blocking periodic outbound connections to port 3680 on
>>> >> a Rackspace IP.  How can I find out more about what's going on?  Maybe
>>> >> which program is generating the connection requests?
>>> >
>>> > Uh, a packet sniffer?
>>> >
>>> > I have an old laptop here that I have a second (cardbus) network card in.
>>> > Really cheap and cheerful - the sort of thing you can pick up on
>>> > freecycle. It's been a while since I've done anything like this, but you
>>> > should be able to stick a box like that between the router and the rest
>>> > of your network, run Wireshark and filter on that port. If the
>>> > connection is encrypted then at least you'll see the originating IP.
>>>
>>> I've actually got the originating local IP from the shorewall log.
>>> I'm just trying to figure out which program and maybe which user on
>>> that system is generating the outbound requests to port 3680.  Is
>>> there any way to get more info without setting up a new box?
>>>
>>> > I don't think it's relevant that the IP belongs to Rackspace - don't they
>>> > just hire (virtual) servers to anyone that wants one?
>>>
>>> Yeah I just meant the request could be going to "anyone".
>>>
>>> - Grant
>>
>> Are you running NPDS in your LAN and is it configured to access any sites on
>> rackspace?
>> --
>> Regards,
>> Mick
>
> I am not running NPDS.  I looked it up when I was researching port
> 3680 and read about it for the first time.  I know which machine is
> making the requests.  Any way to drill down further?

If the machine is running linux, then 'watch "lsof -n|grep TCP|grep
3680"' as root is a sloppy but effective way to find it. There's
probably some way to set up a firewall rule on the host in question
that logs out the user and (possibly) PID of the connection, but I
don't know.

If the machine is running Windows, then I'd suggest SysInternals
TCPView: http://technet.microsoft.com/en-us/sysinternals/bb897437

-- 
:wq

Reply via email to