Mothra wrote:
>
> Arent you being a little hasty?
perhaps a little, it wasn't the kind of thorough port scanning i've seen
before, but i have seen sustained port scans of my machine before.
> Now what makes you think a crime was being attempted?
just that a machine i had nothing to do with was trying to get in, on an
ip that's specifically for dialup, which a "who is" would confirm.
> Like he said a Port Scan is not illegal. When someone actually hacks in,
> then you have grounds.
when someone actively tries to break in is the time to be worried and
take action, waiting for them to actually break in is foolish, and if
they do actually break in it may be very, very hard to find out what
they did since intruders often attempt to modify system logs.
> For all you know someone hit the wrong button in a network app and happened
> to scan your IP.
possibly, but it was several attempts in a short time period, there's no
good reason for a third party to ping me repeatedly.
> Did you even bother to do a lookup or whois on the address that was scanning
> you?
that's the first thing i did of course, which is how i new who to
email. frequently when i've looked up the ip of a port scanner it
coming from what who is identifies as a "dialup" line, few if any dialup
customers have a legitimate need to probe distant machines.
in this particular case, it probably was benign, but i always report
such activity, if nothing else it helps to build a case later if it's
repeated. i've also had remote servers try to get my "ident" info with
a spoofed source ip, when i checked with the company who is pointed to
they checked the logs and determined it didn't come from them. who ever
it was tried several times and also tried to scan for other ports. any
one who scans a large number of ports is obviously looking for a back
door into the system. obviously sometimes network maintenance may do
this accidentally, but they shouldn't be checking all the ports either normally.
---------
--
"Security is mostly a superstition. It does not exist in nature, nor do
the children of men as a whole experience it. Avoiding danger is no
safer in the long run than outright exposure. Life is either a daring
adventure, or nothing."
- Helen Keller, American Blind/Deaf Author & Lecturer...
--
G-List is sponsored by <http://lowendmac.com/> and...
Small Dog Electronics http://www.smalldog.com | Refurbished Drives |
-- We have Apple Refurbished Monitors in stock! | & CDRWs on Sale! |
Support Low End Mac <http://lowendmac.com/lists/support.html>
G-List list info: <http://lowendmac.com/lists/g-list.shtml>
Send list messages to: <mailto:[EMAIL PROTECTED]>
To unsubscribe, email: <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>
Using a Macintosh? Get free email and more at Applelinks!
<http://www.applelinks.com>