Solved

Several attempts on our firewall on port 113? Is this needed?

Posted on 2008-10-30
6
272 Views
Last Modified: 2013-11-16
I have noticed several connections from external IP addresses attempting to connect to our firewall's main Ip address on port 113. They are all being blocked, but I am wondering what these connections are and why are they being attempted?

Can someone help me with this?
0
Comment
Question by:nichiaiinc
  • 3
  • 3
6 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 22856804
Port 113 is used for Authentication Service / Identification Protocol; as the connections are blocked and you do not have any open service you need not bother. If you wish, you can put the IP under blocked site or the port under blocked ports; also you might wish to contact your ISP and blacklist the sender completely.

Thank you.
0
 

Author Comment

by:nichiaiinc
ID: 22860317
thanks again for answering another one of my questions DPK WAL. Is there any possibility that these connections could be legitimate and I should be allowing them through?
0
 
LVL 32

Assisted Solution

by:dpk_wal
dpk_wal earned 500 total points
ID: 22860409
If you are not hosting any service which needs the incoming session then they cannot be legitimate; if the application needs incoming connection which are part of the session then they would be allowed by the firewall [but not on a different port].

Are you running in any problem where some of the auth service not working properly; if none then I do not think that the connections are legitimate.

Thank you.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 32

Expert Comment

by:dpk_wal
ID: 22860725
You are welcome; happy I could be of assistance! :)
0
 

Author Comment

by:nichiaiinc
ID: 22860650
thanks DPK WAL!
0
 

Author Closing Comment

by:nichiaiinc
ID: 31511607
Perfect!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now