Unimus should tell you what's changed in the router's config. 



----- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 




----- Original Message -----

From: "TJ Trout" <[email protected]> 
To: [email protected] 
Sent: Monday, August 13, 2018 6:00:21 PM 
Subject: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack 
source 


Anyone know of a mikrotik exploit or what this traffic capture might mean? 


I have my router locked down and all common abuse ports/services filtered in 
both router and pass thru to customers.... 


---------- Forwarded message --------- 
From: BitNinja < [email protected] > 
Date: Tue, Aug 14, 2018, 10:58 AM 
Subject: Your server 162.222.29.1 has been registered as an attack source 
To: < [email protected] > 





        

        
        
                

Dear Provider, 

I’m George Egri, the Co-Founder and CEO of BitNinja Server Security. I’m 
writing to inform you that we have detected malicious requests from the IP 
162.222.29.1 directed at our clients’ servers. 

As a result of these attacks, we have added your IP to our greylist to prevent 
it from attacking our clients’ servers. 

Servers are increasingly exposed as the targets of botnet attacks and you might 
not be aware that your server is being used as a “bot” to send malicious 
attacks over the Internet. 


I've collected the 3 earliest logs below, and you can find the freshest 100, 
that may help you disinfect your server, under the link. The timezone is UTC 
+2:00. 
http://bitninja.io/incidentReport.php?details=7281f016fb83701789 

{
    "PORT HIT": "162.222.29.1:32862-> 94.46.59.143:8080 ",
    "MESSAGES": "Array
                (
                    [11:34:08] => GET / HTTP/1.1
                Host: 94.46.59.143:8080 User-Agent: Mozilla/5.0 (Windows NT 
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 
Safari/537.36
                Content-Length: 0
                
                
                )
                "
} {
    "PORT HIT": "162.222.29.1:57131-> 37.187.190.61:8080 ",
    "MESSAGES": "Array
                (
                    [19:06:48] => GET / HTTP/1.1
                Host: 37.187.190.61:8080 User-Agent: Mozilla/5.0 (Windows NT 
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 
Safari/537.36
                Content-Length: 0
                
                
                )
                "
} {
    "PORT HIT": "162.222.29.1:56717-> 104.128.74.105:8080 ",
    "MESSAGES": "Array
                (
                    [16:26:25] => GET / HTTP/1.1
                Host: 104.128.74.105:8080 User-Agent: Mozilla/5.0 (Windows NT 
6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 
Safari/537.36
                Content-Length: 0
                
                
                )
                "
} 



Please keep in mind that after the first intrusion we log all traffic between 
your server and the BitNinja-protected servers until the IP is removed from the 
greylist. This means you may see valid logs beside the malicious actions in the 
link above. If you need help finding the malicious logs, please don’t hesitate 
to contact our incident experts by replying to this e-mail. 

For more information on analyzing and understanding outbound traffic, check out 
this: 
https://doc.bitninja.io/_images/bitninja-incident-report-1.jpg? 
We’ve also dedicated an entire site help people prevent their server from 
sending malicious attacks: 
https://doc.bitninja.io/investigations.html 

Our incident experts are also happy to help you and can provide detailed logs 
if needed. Please, feel free to connect me with the administrator or technical 
team responsible for managing your server. 

Thank you for helping us make the Internet a safer place! 

Regards, 

George Egri 
CEO at BitNinja.io 
BitNinja.io @ BusinessInsider UK 
BitNinja.io hits the WHIR.com 
BitNinja @ CodeMash conference 
        
        
        


Partnered by: 




-- 
AF mailing list 
[email protected] 
http://af.afmug.com/mailman/listinfo/af_af.afmug.com 

-- 
AF mailing list
[email protected]
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to