?
Solved

is the firewall being attacked?

Posted on 2008-10-21
1
Medium Priority
?
1,234 Views
Last Modified: 2013-11-08
The firewall (Sonicwall TZ170) is logging the following
Possible port scan dropped 222.187.221.126, 12200, WAN xx.xx.xx.xx, 8081, WAN TCP scanned port list, 8080, 80, 1080, 8800, 8118
or Probable port scan dropped 4.71.104.187, 80, WAN xx.xx.xx.xx, 49809, WAN TCP scanned port list, 49507, 49507, 49509, 49509, 49531, 49531, 49557, 49557, 49643, 49643

Note: I replaced our wan ip with XX.xx.xx.xx and attached the scrren shots for your review.
In addition I am using non standard login name and strong password and add my IP to be able to connect from remote location to the firewall only. anything else I should be concerned?
1-spoof-IP.JPG
2-spoof-IP.JPG
Firewall-log.JPG
0
Comment
Question by:AsgharE
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
babazohaib earned 1500 total points
ID: 22774013
Seems like some bot is scanning for the open ports on your network.It usually happens on the internet
as there are several machines daily getting infected and being the victim of hosting other programs.I usually see my linux machines log file filled with the several attempts.I believe if you keep your servers
patched and upto date in virus definitions and having a vigilant eye on your network and having enterprise level firewalls properly configured there is very less chance of being attacked.But no one can guarantee that you are 100% percent protected.
0

Featured Post

Get MySQL database support online, now!

At Percona’s web store you can order your MySQL database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question