Solved

is the firewall being attacked?

Posted on 2008-10-21
1
1,220 Views
Last Modified: 2013-11-08
The firewall (Sonicwall TZ170) is logging the following
Possible port scan dropped 222.187.221.126, 12200, WAN xx.xx.xx.xx, 8081, WAN TCP scanned port list, 8080, 80, 1080, 8800, 8118
or Probable port scan dropped 4.71.104.187, 80, WAN xx.xx.xx.xx, 49809, WAN TCP scanned port list, 49507, 49507, 49509, 49509, 49531, 49531, 49557, 49557, 49643, 49643

Note: I replaced our wan ip with XX.xx.xx.xx and attached the scrren shots for your review.
In addition I am using non standard login name and strong password and add my IP to be able to connect from remote location to the firewall only. anything else I should be concerned?
1-spoof-IP.JPG
2-spoof-IP.JPG
Firewall-log.JPG
0
Comment
Question by:AsgharE
1 Comment
 
LVL 1

Accepted Solution

by:
babazohaib earned 500 total points
ID: 22774013
Seems like some bot is scanning for the open ports on your network.It usually happens on the internet
as there are several machines daily getting infected and being the victim of hosting other programs.I usually see my linux machines log file filled with the several attempts.I believe if you keep your servers
patched and upto date in virus definitions and having a vigilant eye on your network and having enterprise level firewalls properly configured there is very less chance of being attacked.But no one can guarantee that you are 100% percent protected.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now