Solved

Is my computer being hacked?

Posted on 2000-05-20
7
363 Views
Last Modified: 2013-11-16
I just install a internet security freeware .today,when I on-line,I have been informed the firewall has blocked the internet access from 203.116.87.164(UDP Port 28737).What is UDP port?This site has been blocked more than 20 times and number of port is increasing everytime.Is my computer being hacked by other person?
0
Comment
Question by:roger_liong
7 Comments
 
LVL 19

Expert Comment

by:MsShadow
ID: 2828892
Well, UDP is a network protocop, you have TCP/IP and you have UDP/IP. Now, it might be that someone is trying to hack you, since the port numbers increase every time. He is probably scanning all your ports.
0
 
LVL 1

Expert Comment

by:Serge Pelletier
ID: 2829770
For your information the ip is from: (more to follow)
Asia Pacific Network Information Center (APNIC2)
   These addresses have been further assigned to Asia-Pacific users.
   Contact information can be found in the APNIC database,
   at WHOIS.APNIC.NET or http://www.apnic.net/
   Please do not send spam complaints to APNIC.

   Netname: APNIC-CIDR-BLK
   Netblock: 202.0.0.0 - 203.255.255.0
   Maintainer: AP

   Coordinator:
      Administrator, System  (SA90-ARIN)  sysadm@APNIC.NET
      +61-7-3367-0490

   Domain System inverse mapping provided by:

   SVC00.APNIC.NET            202.12.28.131
   NS.APNIC.NET                  203.37.255.97
   NS.TELSTRA.NET            203.50.0.137
   NS.RIPE.NET                  193.0.0.193

   Regional Internet Registry for the Asia-Pacific Region.
   
   *** Use whois -h whois.apnic.net *** *** or see http://www.apnic.net/db/ for database assistance *** Record last updated on 18-Jun-1999. Database last updated on 19-May-2000 17:47:32 EDT.
0
 
LVL 1

Accepted Solution

by:
Serge Pelletier earned 50 total points
ID: 2829772
Roger,

I am using Black ice firewall since 2 weeks because someone was hacking me.

I do see the same warning from my firewall software and here how they explain the "alert":


False Positives

This is not necessarily an attack.

This may be what is known as a "false-positive", which is when the product detects an anomaly that isn't actually an attack.

The most common source of this alert is when the user first dials up to the Internet. Busy ISPs will re-assign IP addresses quickly, which means that as soon as you dial-up with your modem, you will be assigned the IP address of another user that just hung up. Any server attempting to send data to that other user will then be sending data at you. (Just like when you get your new telephone number and you start receiving phone calls intended for the person who used to own it). The product triggers this alert every time it receives UDP data that your computer never asked for.

A common source of this attack is from RealNetworks audio/video servers. You can guess this for yourself by checking the port number (which is part of the URL above). RealAudio uses ports in the range between 6970-7080. RealNetworks triggers this alert because it is very popular, and therefore one of the more common protocols that people receive as soon as they dial-up. It also triggers this because servers will still stream data at your computer for a little while even when your RealNetworks client shuts down. Please see article q000121.

Summary

Somebody has tried to access your machine and failed.


Details

This is one of the most common intrusions detected on the Internet. This is so common because hackers do frequent wide-spread scans looking for one specific exploit they can use to break into systems. The typical hacker scans thousands or millions of machines in a typical scan. In other words, the hacker isn't targeting you personally. In particular, this event is generated upon failed attempts, so there is no reason to worry.

Probes like this result from "script-kiddies", hackers just above the skill level of trained monkeys. They download attack programs (called "scripts") from various sites on the net, then run them against millions of machines. There are thousands of script-kiddies out there, so if you have a always-on connection (cable-modem, DSL), then you can expect about one of these scans per day.

About 10% of these scans are from forged (spoofed) addresses. This means the indicated IP address in the attack is probably from the real attack, but a small percentage of the time the indicated person is completely innocent.

About 20% of these scans are from machines already compromised by a hacker. In other words, if you report this scan back to the originator, they may thank you, because you've discovered a hacked system on their network they didn't know about.

Information on reporting the hacker can be found in our support Knowledge Base article q000016.

Ports

A port is a point of entry into a system. Each program running on a system is reached through its own ports. Most ports are "well-known", you can look them up in a table in order to get a good sense of what the hacker was looking for.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 1

Expert Comment

by:Serge Pelletier
ID: 2829773
Ooops just for your information and copyrights : http://www.networkice.com
0
 
LVL 1

Expert Comment

by:deltree
ID: 2829820
Two well done answers. I just had to comment on them.
0
 
LVL 55

Expert Comment

by:andyalder
ID: 2831076
>>(UDP Port 28737).

Not a well known port, I'd panic and turn my PC off quickly if I was you!!

0
 

Expert Comment

by:jonsanderson
ID: 2849667
I seem to remember that netbus runs on this port or one very near, but i may be wrong
0

Featured Post

Don't miss ATEN at NAB Show April 24-27!

Visit ATEN at NAB Show to learn how our "Seamlessly Entertaining" solutions deliver fast, precise video streaming without delays for the broadcasting and media environment. ATEN will showcase its 16x16 Modular Matrix Switch (VM1600) and KVM Over IP Solution (KE6900 series).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question