Hi all,

In response, feel free to let me know if you know of  better list to aim questions 
like this:

My client has been portscanned for several weeks now.  Upward of thirty scans a day, 
with a similar profile.  They each scan the IP block owned (and concievably the scan 
continues past our block onto the next).

The scans continually look for responses on a small set of ports, one port per scan.  
The same port is being scanned on the IP block a multitude of times.

Each time the scan comes from a new IP address, and they are rarely reused.

Scanning the IP addresses back, I find that some are locked down, and some respond on 
common trojan ports.  One of them turned out to be a router.

I am thinking that it is likely to be a single source with forged source IP.  And the 
repeated scan on the same ports for this amount of time suggest perhaps the perp 
cannot see the response packets, and perhaps isn't aware or understanding what they 
are doing.

I am getting sniffs of the packets to see if I can passive fingerprint the source OS, 
and that should indicate somewhat if there actually is a single source or not.  If 
not, I will look further into the IPs, though it seems unlikely someone with access to 
so many IP addresses would be doing something so benign.

If it does appear to be a single source, then does any have any further tips on how to 
determine where it comes from.  My only apparent course of action is to get my ISP to 
sniff for these packets at various parts of their network and see where they get 
introduced.

Any other ideas?

Thanks,

Paul. 

------------------------------------------------
Global WebMail -
  Delivered by Global Internet www.global.net.uk
------------------------------------------------



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to