I have a piece of equipment connected to the public internet for something I'm doing with a friend. It is protected by an access-list restricting the source address and the particular application.
However, in monitoring the device, I am seeing what appear to be not only TCP port scans, but IP protocol scans. I.e. a series of inquiries using different successive IP protocol numbers. 17:43:26: datagramsize=48, IP 87: s=x.x.x.x (local), d=12.246.161.19, totl 17:43:26: datagramsize=48, IP 87: s=x.x.x.x (local), d=12.246.161.19 (Fast 17:43:26: datagramsize=70, IP 87: s=x.x.x.x (local), d=12.246.161.19 (Fast 17:43:32: datagramsize=48, IP 88: s=x.x.x.x (local), d=12.246.161.19, totlen 56, 17:56:30: datagramsize=48, IP 90: s=x.x.x.x (local), d=61.37.239.23, totle 17:56:36: datagramsize=48, IP 91: s=x.x.x.x (local), d=61.37.239.23, totle ( this output is showing the reply my device is sending to the IP's in question. ) at least, I am assuming that the IP XX = the IP protocol number, as reported by the debug. Just wondering if one of you security gurus might shed some light here, seeing as how out of touch I seem to be. This one of the standard hacking procedures? Been around a while? new because so many entities are now doing a lot more to crack down on TCP port scanning? I checked the various registries. The behavior is coming from several places, some Thailand, some Korea, some from customers of ATT.net Just looking to increase my awareness. thanks. Chuck Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=49358&t=49358 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

