Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

is the firewall being attacked?

Posted on 2008-10-21
1
Medium Priority
?
1,241 Views
Last Modified: 2013-11-08
The firewall (Sonicwall TZ170) is logging the following
Possible port scan dropped 222.187.221.126, 12200, WAN xx.xx.xx.xx, 8081, WAN TCP scanned port list, 8080, 80, 1080, 8800, 8118
or Probable port scan dropped 4.71.104.187, 80, WAN xx.xx.xx.xx, 49809, WAN TCP scanned port list, 49507, 49507, 49509, 49509, 49531, 49531, 49557, 49557, 49643, 49643

Note: I replaced our wan ip with XX.xx.xx.xx and attached the scrren shots for your review.
In addition I am using non standard login name and strong password and add my IP to be able to connect from remote location to the firewall only. anything else I should be concerned?
1-spoof-IP.JPG
2-spoof-IP.JPG
Firewall-log.JPG
0
Comment
Question by:AsgharE
1 Comment
 
LVL 1

Accepted Solution

by:
babazohaib earned 1500 total points
ID: 22774013
Seems like some bot is scanning for the open ports on your network.It usually happens on the internet
as there are several machines daily getting infected and being the victim of hosting other programs.I usually see my linux machines log file filled with the several attempts.I believe if you keep your servers
patched and upto date in virus definitions and having a vigilant eye on your network and having enterprise level firewalls properly configured there is very less chance of being attacked.But no one can guarantee that you are 100% percent protected.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question