Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Attack ?

Posted on 2011-09-10
Medium Priority
Last Modified: 2013-11-22
I have Windows 2003 router

I am having lot of drop on NIC with IP

When I run Windump I get following pakcets (9000 + pr/sec)

07:24:00.320690 IP > R 781344400:781344400(0) win 0
07:24:00.320792 IP > R 781344400:781344400(0) win 0

No interface have the IP 192.168.x.x and I am not using it anywhere
The IP have not been online for more than 2 days.

This starts every several hours and it runs for about 10-20 min each time.

Question by:soffcec
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
LVL 10

Accepted Solution

Arman Khodabande earned 1600 total points
ID: 36516091
Is it ""    or     "" ?
if 445 is the port then :
it means that some packet has been sent from your computer (from445 port) to some computer with private ip address on your network(

Technical description for port 445:

Services or applications using this port:File Sharing Protocols
Malicious services / applications:N/A

Among the new ports used by Windows 2000, Windows XP and Windows Server 2003, is TCP port 445 which is used for SMB over TCP.(service message block)
The port 445 is a service message block used for file sharing on Windows XP, 2000, 2003, ME, and other SAMBA-related connections. It is used by various operating systems to give security options at high levels.
The port 445 in inbound traffic scans the system typically for shared files that users outside try to harvest into the computer's system. This is blocked by port 445 to avoid the installation of malicious applications.
The Port 445 in outbound traffic, on the other hand, relies on the user_s consent. It scans and checks the files that the user uploads on the host system. It sends a verification protocol for the process to be safe for each computer.
The port 445 is commonly used for file-sharing. It connects the user to the server and vice versa. The port 445 is a typical file transfer security protocol to monitor the risk of overflow and program redundancy in sharing files. It is commonly used in network topology. Most router hardware are embedded with this protocol for its well secured firewall.
(copy/pasted from          http://www.pc-library.com/ports/tcp-udp-port/445/)

However the destination port on that computer is not a known port! you need to find out where the computer with ip address is! And where is your information going!
As much as I know that IP is for private network and is not coming from outside of your network! so it's something near you.
I'm not familiar with network tracing and I'm just trying to give you a general help!
Ping that IP address to see if it's always online or not!
If you couldn't find out the matter, ask a network pro.
If you have any firewall software block that IP for now! (However it may be a trusted IP)

Author Comment

ID: 36516540
it is, but i cant find out how this address can do anything because the router is routing from 10.0.10.x to 10.0.1.x and should not been seen there.
 I know computer and it has not been online for more than 2 days, and there has been no traffic from, only to it.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 1600 total points
ID: 36516967
As far as I know we do not have such an IP address with 5 parts and the last number represents the port used for the connection.
And as the port is for SMB (some feature of windows server 2003) it may be a trusted action from the OS or the router itself!

The IP address is usually the IP for your Router (check your default gateway). So the router is sending some data packets. (Maybe it's a normal checking procedure)

Please ping the IP  in cmd while the computer ( ) is offline to see that is it returning packets or not.
Maybe some other computer has replaced that offline PC and is receiving data!
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.


Author Comment

ID: 36517036
no computer is answaring,  and windump cannot see anything coming from it. All gateways are ok. N

Author Comment

ID: 36517116
the fifth part of the ip number is the port number.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 1600 total points
ID: 36517715
So I don't think that is a dangerous action. However you can bock it via your firewall if uncomfortable.
LVL 30

Assisted Solution

by:Sudeep Sharma
Sudeep Sharma earned 400 total points
ID: 36538515
Do you have Virtual Machine running on the system? Or even VM application like VMWare or VirtualBox? Most of these application has 192.168.1.X range by default.

Author Comment

ID: 36577044
It look like I have malfunction in one of my dslams, every time I cold restart the dslam, the attack stops.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 1600 total points
ID: 36578964
So it was more complicated than I could imagine ?!!!!
LVL 10

Expert Comment

by:Arman Khodabande
ID: 36591891
Good luck

Featured Post

WEBINAR - Latest Cyber Tips for Defense

Join the WatchGuard Threat Research Team on October 26th for an informative webinar featuring expert tips and tricks for defending your organization from today's latest cyber threats. Don't leave yourself vulnerable to attack. Register for the webinar today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question