[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

ISA automatically contact whois email of an attacker?

Posted on 2004-10-08
3
Medium Priority
?
309 Views
Last Modified: 2010-04-09
Alright,
I frequently am getting alerts from ISA server informing me of a "port scan" or other attack. Does anyone know of a way that I can get ISA to automatically take the offending IP, whois it, get the contact email, and email them telling them the IP of the attacker?

Let me know of any ideas. Thanks,
Matt
0
Comment
Question by:hattmardy
3 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 880 total points
ID: 12261125
If you can get the log-file into a text readable format, you could knock up a batch script to do this for you.
However...  if I were you, I would ignore these port-scans and put them down to white noise.
Everytime you report someone, there'll be another 10 on your doorstep.
Also, automated emails are spam, so make sure you don't get into trouble !
0
 
LVL 14

Assisted Solution

by:chris_calabrese
chris_calabrese earned 880 total points
ID: 12261132
This is usually not considered worthwhile since a) its very hard to get an ISP to act just based on port scanning, b) most of this type of traffic is generated from worms and such, so there's no hope of keeping up with the deluge of differnt addresses, following up on each one, etc., and c) "real" attackers (the kind you need to worry about) are likely to notice that you did the whois lookup and sent the email so they'll know that you're watching.
0
 
LVL 2

Author Comment

by:hattmardy
ID: 12263899
Thanks guys, you both made good points. I split the points. Keep up the good work.
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question