Attack ?

Posted on 2011-09-10
Last Modified: 2013-11-22
I have Windows 2003 router

I am having lot of drop on NIC with IP

When I run Windump I get following pakcets (9000 + pr/sec)

07:24:00.320690 IP > R 781344400:781344400(0) win 0
07:24:00.320792 IP > R 781344400:781344400(0) win 0

No interface have the IP 192.168.x.x and I am not using it anywhere
The IP have not been online for more than 2 days.

This starts every several hours and it runs for about 10-20 min each time.

Question by:soffcec
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
LVL 10

Accepted Solution

Arman Khodabande earned 400 total points
ID: 36516091
Is it ""    or     "" ?
if 445 is the port then :
it means that some packet has been sent from your computer (from445 port) to some computer with private ip address on your network(

Technical description for port 445:

Services or applications using this port:File Sharing Protocols
Malicious services / applications:N/A

Among the new ports used by Windows 2000, Windows XP and Windows Server 2003, is TCP port 445 which is used for SMB over TCP.(service message block)
The port 445 is a service message block used for file sharing on Windows XP, 2000, 2003, ME, and other SAMBA-related connections. It is used by various operating systems to give security options at high levels.
The port 445 in inbound traffic scans the system typically for shared files that users outside try to harvest into the computer's system. This is blocked by port 445 to avoid the installation of malicious applications.
The Port 445 in outbound traffic, on the other hand, relies on the user_s consent. It scans and checks the files that the user uploads on the host system. It sends a verification protocol for the process to be safe for each computer.
The port 445 is commonly used for file-sharing. It connects the user to the server and vice versa. The port 445 is a typical file transfer security protocol to monitor the risk of overflow and program redundancy in sharing files. It is commonly used in network topology. Most router hardware are embedded with this protocol for its well secured firewall.
(copy/pasted from

However the destination port on that computer is not a known port! you need to find out where the computer with ip address is! And where is your information going!
As much as I know that IP is for private network and is not coming from outside of your network! so it's something near you.
I'm not familiar with network tracing and I'm just trying to give you a general help!
Ping that IP address to see if it's always online or not!
If you couldn't find out the matter, ask a network pro.
If you have any firewall software block that IP for now! (However it may be a trusted IP)

Author Comment

ID: 36516540
it is, but i cant find out how this address can do anything because the router is routing from 10.0.10.x to 10.0.1.x and should not been seen there.
 I know computer and it has not been online for more than 2 days, and there has been no traffic from, only to it.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 400 total points
ID: 36516967
As far as I know we do not have such an IP address with 5 parts and the last number represents the port used for the connection.
And as the port is for SMB (some feature of windows server 2003) it may be a trusted action from the OS or the router itself!

The IP address is usually the IP for your Router (check your default gateway). So the router is sending some data packets. (Maybe it's a normal checking procedure)

Please ping the IP  in cmd while the computer ( ) is offline to see that is it returning packets or not.
Maybe some other computer has replaced that offline PC and is receiving data!
DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.


Author Comment

ID: 36517036
no computer is answaring,  and windump cannot see anything coming from it. All gateways are ok. N

Author Comment

ID: 36517116
the fifth part of the ip number is the port number.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 400 total points
ID: 36517715
So I don't think that is a dangerous action. However you can bock it via your firewall if uncomfortable.
LVL 30

Assisted Solution

by:Sudeep Sharma
Sudeep Sharma earned 100 total points
ID: 36538515
Do you have Virtual Machine running on the system? Or even VM application like VMWare or VirtualBox? Most of these application has 192.168.1.X range by default.

Author Comment

ID: 36577044
It look like I have malfunction in one of my dslams, every time I cold restart the dslam, the attack stops.
LVL 10

Assisted Solution

by:Arman Khodabande
Arman Khodabande earned 400 total points
ID: 36578964
So it was more complicated than I could imagine ?!!!!
LVL 10

Expert Comment

by:Arman Khodabande
ID: 36591891
Good luck

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What is Ransomware? 16 98
How to Link NetGear wireless AC-1200 router to Sonicwall 3600 13 72
Rensome / malware protection 9 75
DHCP Lease/Reservations 3 38
HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
There are two basic ways to configure a static route for Cisco IOS devices. I've written this article to highlight a case study comparing the configuration of a static route using the next-hop IP and the configuration of a static route using an outg…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question