I have had 2 DDoS attacks in the past 2 days to one of my machines, but I
have just noticed something very odd in my traffic flow.

One of my other machines, not the one that was the target of the DDoS,
initiated a TCP session to 206.109.64.186 port 2064.  Now as far as I am
aware I haven't done anything to cause this machine, its my desktop w/s,
to inititate this session so I ran an nmap scan and came up with this:

# nmap -sS -O -F 206.109.64.186
 
Starting nmap V. 2.30BETA17 by [EMAIL PROTECTED] (
www.insecure.org/nmap/ )
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
WARNING: OS didn't match until the 2 try
Interesting ports on Your.Unreality.com (206.109.64.186):
Port       State       Service
21/tcp     open        ftp
22/tcp     open        ssh
25/tcp     open        smtp
80/tcp     open        http
110/tcp    open        pop-3
111/tcp    open        sunrpc
113/tcp    open        auth
143/tcp    open        imap2
2064/tcp   open        distrib-netassholes
3306/tcp   open        mysql
6005/tcp   filtered    X11:5
6666/tcp   open        irc-serv
8080/tcp   open        http-proxy
 
Remote operating system guess: FreeBSD 2.2.1 - 3.2
 
Nmap run completed -- 1 IP address (1 host up) scanned in 818 seconds

Can ayone tell me what service distrib-netassholes is?  It telnets but
doesn't give anything out to indicate what it is.
-- 
Howard.
______________________________________________________
LANNet Computing Associates <http://www.lannet.com.au>



--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to