Solved

is the firewall being attacked?

Posted on 2008-10-21
1
1,229 Views
Last Modified: 2013-11-08
The firewall (Sonicwall TZ170) is logging the following
Possible port scan dropped 222.187.221.126, 12200, WAN xx.xx.xx.xx, 8081, WAN TCP scanned port list, 8080, 80, 1080, 8800, 8118
or Probable port scan dropped 4.71.104.187, 80, WAN xx.xx.xx.xx, 49809, WAN TCP scanned port list, 49507, 49507, 49509, 49509, 49531, 49531, 49557, 49557, 49643, 49643

Note: I replaced our wan ip with XX.xx.xx.xx and attached the scrren shots for your review.
In addition I am using non standard login name and strong password and add my IP to be able to connect from remote location to the firewall only. anything else I should be concerned?
1-spoof-IP.JPG
2-spoof-IP.JPG
Firewall-log.JPG
0
Comment
Question by:AsgharE
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
babazohaib earned 500 total points
ID: 22774013
Seems like some bot is scanning for the open ports on your network.It usually happens on the internet
as there are several machines daily getting infected and being the victim of hosting other programs.I usually see my linux machines log file filled with the several attempts.I believe if you keep your servers
patched and upto date in virus definitions and having a vigilant eye on your network and having enterprise level firewalls properly configured there is very less chance of being attacked.But no one can guarantee that you are 100% percent protected.
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question