Security Incidents mailing list archives
Re: Proxy Scans to dial up hosts...
From: Bill_Royds () pch gc ca
Date: Fri, 30 Nov 2001 17:03:49 -0500
That is standard behavior for IRC servers as this one is. Port 1080 and 8080 are used for proxying (1080 for Winproxy, 8080 for HTTP) and servers running these proxies are often misused be people trying to attack IRC hosts by hiding true origin. General IRC policy is to not allow users coming from hosts running proxies, so the automatically scan any IP attempting to connect. In this instance, this is a sign of good security, not hacking. Bill Royds System Administrator, CHIN ph: (819) 994-1200 X 239 "Grimes, Shawn (NIA/IRP)" <GrimesSh () grc nia nih gov> 11/30/01 10:14 AM To: incidents () securityfocus com cc: (bcc: Bill Royds/HullOttawa/PCH/CA) Subject: Proxy Scans to dail up hosts... I notice in my snort logs that I have a box: 193.109.122.5 (proxyscan.undernet.org) That is connecting to some of our dial-up hosts and performing FYN scans on 1080 & 8080 (proxies). Has anyone else seen similar activity? Thank You, Shawn Grimes Computer Specialist NCTS - Gerontology Research Center 410-558-8007 grimessh () grc nia nih gov ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Re: Proxy Scans to dial up hosts... Bill_Royds (Dec 01)
- <Possible follow-ups>
- RE: Proxy Scans to dial up hosts... Ascent - Compton, Richard (Dec 01)