Solved

is the firewall being attacked?

Posted on 2008-10-21
1
1,203 Views
Last Modified: 2013-11-08
The firewall (Sonicwall TZ170) is logging the following
Possible port scan dropped 222.187.221.126, 12200, WAN xx.xx.xx.xx, 8081, WAN TCP scanned port list, 8080, 80, 1080, 8800, 8118
or Probable port scan dropped 4.71.104.187, 80, WAN xx.xx.xx.xx, 49809, WAN TCP scanned port list, 49507, 49507, 49509, 49509, 49531, 49531, 49557, 49557, 49643, 49643

Note: I replaced our wan ip with XX.xx.xx.xx and attached the scrren shots for your review.
In addition I am using non standard login name and strong password and add my IP to be able to connect from remote location to the firewall only. anything else I should be concerned?
1-spoof-IP.JPG
2-spoof-IP.JPG
Firewall-log.JPG
0
Comment
Question by:AsgharE
1 Comment
 
LVL 1

Accepted Solution

by:
babazohaib earned 500 total points
ID: 22774013
Seems like some bot is scanning for the open ports on your network.It usually happens on the internet
as there are several machines daily getting infected and being the victim of hosting other programs.I usually see my linux machines log file filled with the several attempts.I believe if you keep your servers
patched and upto date in virus definitions and having a vigilant eye on your network and having enterprise level firewalls properly configured there is very less chance of being attacked.But no one can guarantee that you are 100% percent protected.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This video discusses moving either the default database or any database to a new volume.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now