[nsp-sec] TCP-23 Increase
Yiming Gong
yiming.gong at xo.com
Mon Jun 30 17:10:38 EDT 2008
I see some number changes on our network, but not very significant, the
following two list are the output from the scan log.
------------+------------+-------------+
| time | unique_dst | target_port |
+------------+------------+-------------+
| 2008-06-10 | 34939 | 23 |
| 2008-06-11 | 50384 | 23 |
| 2008-06-12 | 22975 | 23 |
| 2008-06-13 | 2355 | 23 |
| 2008-06-14 | 27439 | 23 |
| 2008-06-15 | 48831 | 23 |
| 2008-06-16 | 35483 | 23 |
| 2008-06-17 | 20925 | 23 |
| 2008-06-18 | 52899 | 23 |
| 2008-06-19 | 34555 | 23 |
| 2008-06-20 | 26991 | 23 |
| 2008-06-21 | 32330 | 23 |
| 2008-06-22 | 36345 | 23 |
| 2008-06-23 | 45796 | 23 |
| 2008-06-24 | 52069 | 23 |
| 2008-06-25 | 50813 | 23 |
| 2008-06-26 | 40853 | 23 |
| 2008-06-27 | 61749 | 23 |
| 2008-06-28 | 93337 | 23 |
| 2008-06-29 | 67662 | 23 |
| 2008-06-30 | 24719 | 23 |
+------------+------------+-------------+
top active hosts started to scan port 23 after Jun 25 0:00.
| 90.41.97.37 | 2008-06-25 12:50 |
| 122.163.142.194 | 2008-06-25 18:15 |
| 196.205.211.200 | 2008-06-25 18:15 |
| 122.163.179.245 | 2008-06-25 18:15 |
| 196.205.210.157 | 2008-06-25 18:25 |
| 212.230.52.44 | 2008-06-26 00:20 |
| 189.47.251.60 | 2008-06-26 11:15 |
| 201.0.97.43 | 2008-06-26 11:15 |
| 64.82.227.135 | 2008-06-26 14:45 |
| 196.205.166.178 | 2008-06-26 21:25 |
| 82.59.140.108 | 2008-06-27 06:05 |
| 79.155.174.252 | 2008-06-27 09:00 |
| 211.31.162.142 | 2008-06-27 11:50 |
| 81.178.101.103 | 2008-06-27 12:50 |
| 66.226.63.193 | 2008-06-27 13:50 |
| 201.68.240.12 | 2008-06-27 17:45 |
| 68.166.126.62 | 2008-06-27 19:10 |
| 80.13.23.204 | 2008-06-27 21:00 |
| 196.219.138.29 | 2008-06-28 01:40 |
| 41.235.188.193 | 2008-06-28 01:40 |
| 92.49.156.149 | 2008-06-28 01:40 |
| 87.117.11.206 | 2008-06-28 01:40 |
| 84.18.97.151 | 2008-06-28 01:40 |
| 81.89.62.49 | 2008-06-28 06:30 |
| 79.77.125.149 | 2008-06-28 14:05 |
| 213.129.114.89 | 2008-06-28 17:15 |
| 194.46.235.9 | 2008-06-29 02:05 |
| 88.24.38.126 | 2008-06-29 05:00 |
| 80.251.115.12 | 2008-06-29 10:10 |
| 67.42.190.206 | 2008-06-29 10:40 |
| 82.201.181.60 | 2008-06-29 12:50 |
| 83.8.123.113 | 2008-06-29 21:00 |
| 84.79.16.81 | 2008-06-30 06:55 |
| 84.78.187.93 | 2008-06-30 07:50 |
| 78.101.197.150 | 2008-06-30 10:35 |
+-----------------+------------------+
Regards!
Yiming
Jason Chambers wrote:
> ----------- nsp-security Confidential --------
>
> Matthew.Swaar at us-cert.gov wrote:
>> I'm working on comparing Ips across multiple days, see if it's a
>> relatively static handful doing this. The traffic appears to be mostly
>> 60bpp SYN scanning, with some SYN-RST thrown in.
>>
>> Anyone have a theory about what prompted this?
>>
>>
>
> Similar observation from here; an increase started on the 25th.
> 212.106.54.173 was the only host found on more than day exceeding 20k
> destinations.
>
> No idea on the reason. Maybe we should make friends with the PNL
> folks or figure out how to build a shared "NUANCE" [1]. I saw it at
> last year's VizSec but haven't gotten anywhere close to replicating it.
>
> --Jason
>
>
> Unique destinations per day:
>
> date | dst_port | dst_host_count
> ---------------------+----------+----------------
> 2008-06-29 00:00:00 | 23 | 99663
> 2008-06-28 00:00:00 | 23 | 106823
> 2008-06-27 00:00:00 | 23 | 96185
> 2008-06-26 00:00:00 | 23 | 58626
> 2008-06-25 00:00:00 | 23 | 104375
> 2008-06-24 00:00:00 | 23 | 13476
> 2008-06-22 00:00:00 | 23 | 12021
> 2008-06-20 00:00:00 | 23 | 13864
> 2008-06-19 00:00:00 | 23 | 11178
> 2008-06-18 00:00:00 | 23 | 53817
>
>
>
>
> [1] http://www.vizsec.org/workshop2007/presentations/pike-context.pdf
>
> Bill Pike, Chad Scherrer and Sean Zabriskie.
> Putting Security in Context: Visual Correlation of Network Activity
> with Real-World Information *
>
> Abstract: To effectively identify and respond to cyber threats,
> computer security analysts must understand the scale, motivation,
> methods, source, and target of an attack. Central to developing this
> situational awareness is the analyst's world knowledge that puts these
> attributes in context. What known exploits or new vulnerabilities
> might an anomalous traffic pattern suggest? What organizational,
> social, or geopolitical events help forecast or explain attacks and
> anomalies? Few visualization tools support creating, maintaining, and
> applying this knowledge of the threat landscape. Through a series of
> formative workshops with practicing security analysts, we have
> developed a visualization approach inspired by the human process of
> contextualization; this system, called NUANCE, creates evolving
> behavioral models of network actors at organizational and regional
> levels, continuously monitors external textual information sources for
> themes that indicate security threats, and automatically determines if
> behavior indicative of those threats is present on a network.
>
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet
> security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list