Welcome to Cyborg`s ASP Comments |
I don`t believe that >6000 hackattempts a week are realistic. That would make 54 hackattempts per hour , with 16 hours online 7 days a week. That`s far too high for a dialup system where you change your ip with every new dial-in, even if he has a fixed ip. Most unexpected incoming packets are not for you, they are for the last(last(last(...))) owner of your ip address, who maybe has connected to a service who checks in regular timeperiods if the host is still there. This could be a webproxie, a mailserver or everything else.
How can you be sure it`s not a hackattempts ?
You can not be sure, but you can make a quick check about the host which send the packet.
you can see two lines of my firewall log from this morning:
06.08.01 09:08:06 Access from host 212.244.200.174 to port tcp/1214 allowed. 06.08.01 09:08:07 Access from host 212.244.200.174 to port tcp/1214 allowed. 06.08.01 09:08:08 Access from host 212.244.200.174 to port tcp/1214 allowed.
These lines are from a host without a nameserverentry and are a check for a trojan or a rootshell as far as i can see it. The four next lines below show, that this port is checked more then one time a week , which makes it sure a vulnerable service ( i don`t have a service entry for that ) or a trojan/rootshell port. This makes the three packets equal to a hackattempts* , i would say it was the vulnerability check before the real hack.
02.08.01 20:07:41 Access from host 65.10.220.21 to port tcp/1214 allowed. 02.08.01 20:07:41 Access from host 65.10.220.21 to port tcp/1214 allowed. 02.08.01 20:07:43 Access from host 65.10.220.21 to port tcp/1214 allowed. 02.08.01 20:07:43 Access from host 65.10.220.21 to port tcp/1214 allowed. 05.08.01 18:37:22 Access from host 172.179.119.198 to port tcp/1214 allowed. 05.08.01 18:37:28 Access from host 172.179.119.198 to port tcp/1214 allowed. 05.08.01 18:37:31 Access from host 172.179.119.198 to port tcp/1214 allowed.
These lines are a from another vulnerability check 32 minutes later.
06.08.01 09:40:16 Access from host 195.126.220.54 to port tcp/21 rejected. 06.08.01 09:40:16 Access from host 195.126.220.54 to port tcp/21 rejected. 06.08.01 09:40:17 Access from host 195.126.220.54 to port tcp/21 rejected.
All these connects are harmless to the amiga. I just thought about sending such scriptkidds a nice 20 MB mp3 as signature of my ftp server :-)))) With a flatrate is this no problem ;-)
You now know how to determine a hackattempts from normal traffic, but don`t believe you know everything, mostly it is useless to mail a sysadmin. Just do that if you are sure you are meant.
* a hackattempts mentioned here can also so be a simple portscan. Mostly a portscan is the first step in trying to hack a host. See how scriptskids work.
Don`t break the rules, scan a host only if they tried to scan you first!
That makes yourself safer against other paranoid sysadmins who send in abusemails to your provider. Keep your logs! that can be important.