Solved

Strange activity reported by sniffer

Posted on 2004-08-19
9
329 Views
Last Modified: 2010-04-11
Hi experts. I have a question for you. I am using EtherDetect Packet Sniffer to monitor my LAN activities. According to the Traffic Report Window, there is the following activity going on:

Start Time 14:10:19.992
Client IP Port: 64.236.34.67:80
Server IP Port: 192.168.2.106:3671 (This is one of my LAN machines.
Protocol: TCP:http
Packets: 10459

This seems bizarre since the rest of the lines show very little activity (all of them are under 100).
And I wonder why one of my machines is acting as a server. Any idea of what this could be? Any solution to the apparent problem?
Thnks
0
Comment
Question by:Jewels1
  • 3
  • 2
  • 2
  • +1
9 Comments
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 11845297
Is that client address on the outside or the inside? If outside addresses can get to inside addresses like that you really need to check on your internet security.

Well, have you checked if that machine is running web services? Kaazaa and some related file-sharing apps can use port 80. So do many worms. You should really check out the LAN machine in question.
0
 
LVL 4

Accepted Solution

by:
bfarmer earned 125 total points
ID: 11845301
The client and server should be switched.

Client IP Port - 192.168.2.106:3671

Server IP Port - 64.236.34.67:80   (80 is the default port for HTTP)

http://64.236.34.67

ICY 404 Resource Not Found
icy-notice1:SHOUTcast Distributed Network Audio Server/posix v1.8.1<BR>
icy-notice2:The resource requested was not found<BR>

Looks like they're getting streaming audio from the site...
0
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 11845335
Oh yeah, didn't notice the client port is 80... your software may be just reading the conversation backwards.
0
 

Author Comment

by:Jewels1
ID: 11845441
Well, the client address is definitely outside (My machines go from 192.168.100 to 106). Do you suggest I block port 80 from my router? I am pretty sure my machine is malware-free but I'll doublecheck
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 2

Expert Comment

by:cyrusuncc
ID: 11845473
is 64.236.34.67 the ip address given by your isp?

go to http://www.whatismyip.com/

see if the traffic is internal or external....

try installing zonealarm on 192.168.2.106 computer and see whats going in or out


0
 
LVL 2

Expert Comment

by:cyrusuncc
ID: 11845508
try forwarding all port 80 requests to 192.168.0.200 (not a computer)

that way all port 80 requests will not be answered by that computer
0
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 11845511
If the outside machine is on port 80, which I didn't notice at first, then this is likely part of a session initiated by your inside machine. An outside machine can't just connect to some high-numbered port on your PC unless it has a service running there. If you block inbound traffic from port 80 you'll block all web access from your LAN- no traffic will be able to come back.
0
 

Author Comment

by:Jewels1
ID: 11845651
You are right Bfarmer. I just found out the user is receiving streaming audio from an online radio website. This matches the description of the problem. Thanks to all.
0
 
LVL 4

Expert Comment

by:bfarmer
ID: 11845662
Jewels1 -

This looks like legitimate traffic, just perhaps not desirable due to bandwidth usage.  If you have a policy against streaming audio, slap the user on the wrist.  If not, then don't worry about it.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now