Solved

ISA automatically contact whois email of an attacker?

Posted on 2004-10-08
3
281 Views
Last Modified: 2010-04-09
Alright,
I frequently am getting alerts from ISA server informing me of a "port scan" or other attack. Does anyone know of a way that I can get ISA to automatically take the offending IP, whois it, get the contact email, and email them telling them the IP of the attacker?

Let me know of any ideas. Thanks,
Matt
0
Comment
Question by:hattmardy
3 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 220 total points
ID: 12261125
If you can get the log-file into a text readable format, you could knock up a batch script to do this for you.
However...  if I were you, I would ignore these port-scans and put them down to white noise.
Everytime you report someone, there'll be another 10 on your doorstep.
Also, automated emails are spam, so make sure you don't get into trouble !
0
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 220 total points
ID: 12261132
This is usually not considered worthwhile since a) its very hard to get an ISP to act just based on port scanning, b) most of this type of traffic is generated from worms and such, so there's no hope of keeping up with the deluge of differnt addresses, following up on each one, etc., and c) "real" attackers (the kind you need to worry about) are likely to notice that you did the whois lookup and sent the email so they'll know that you're watching.
0
 
LVL 2

Author Comment

by:hattmardy
ID: 12263899
Thanks guys, you both made good points. I split the points. Keep up the good work.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
iptables and udp ports 23 125
Logging pfSense on Kiwi 4 73
Network Activities  please help 16 79
ASE reports it as spam 2 638
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question