[nsp-sec] TCP-23 Increase
Rob Thomas
robt at cymru.com
Mon Jun 30 22:15:55 EDT 2008
Hi, Matt.
Our Darknets saw a similar spike:
Hits Date UTC
4938 2008-06-24
16948 2008-06-25
26113 2008-06-26
25852 2008-06-27
17767 2008-06-28
20376 2008-06-29
520 2008-06-30
Ah, but that's not the first such spike. Check out all of 2008-06 UTC:
Hits Date UTC
9109 2008-06-01
6982 2008-06-02
7672 2008-06-03
4781 2008-06-04
2973 2008-06-05
8121 2008-06-06
12374 2008-06-07
10367 2008-06-08
11046 2008-06-09
13062 2008-06-10
8085 2008-06-11
5877 2008-06-12
11088 2008-06-13
17813 2008-06-14
9138 2008-06-15
11817 2008-06-16
10955 2008-06-17
17767 2008-06-18
7591 2008-06-19
15683 2008-06-20
8349 2008-06-21
5453 2008-06-22
6879 2008-06-23
4938 2008-06-24
16948 2008-06-25
26113 2008-06-26
25852 2008-06-27
17767 2008-06-28
20376 2008-06-29
520 2008-06-30
The previous month was quite a bit more quiet for TCP 23.
Hits Date UTC
2135 2008-05-01
2261 2008-05-02
1695 2008-05-03
1732 2008-05-04
1218 2008-05-05
4141 2008-05-06
3970 2008-05-07
3832 2008-05-08
4313 2008-05-09
2255 2008-05-10
2384 2008-05-11
5450 2008-05-12
8733 2008-05-13
6726 2008-05-14
11544 2008-05-15
9625 2008-05-16
9888 2008-05-17
9217 2008-05-18
9269 2008-05-19
8536 2008-05-20
7328 2008-05-21
9881 2008-05-22
9755 2008-05-23
8919 2008-05-24
10233 2008-05-25
9574 2008-05-26
8558 2008-05-27
11569 2008-05-28
6637 2008-05-29
8956 2008-05-30
8580 2008-05-31
So yeah, biggest spike starts on 2008-06-26 UTC, etc., but there were a
few such spikes earlier in the month.
Here are the top ten hitters for 2008-06 UTC. The seventh column is the
number of TCP 23 probes we saw.
4782 | 117.56.37.9 | 117.56.0.0/16 | TW | apnic |
2007-06-28 | 6027 | GSNET Data Communication Business Group
4837 | 202.97.142.10 | 202.97.128.0/19 | CN | apnic |
1998-08-17 | 4751 | CHINA169-BACKBONE CNCGROUP China169 Backbone
6320 | 86.53.62.33 | 86.53.0.0/16 | GB | ripencc |
2005-05-10 | 1126 | TELECOMPLETE-AS Telecomplete Ltd, UK
6471 | 164.77.213.115 | 164.77.128.0/17 | CL | lacnic |
1992-12-23 | 1084 | ENTEL CHILE S.A.
9848 | 211.239.151.162 | 211.239.150.0/23 | KR | apnic |
2000-09-08 | 1295 | GNGAS Enterprise Networks
13037 | 82.71.72.110 | 82.68.0.0/14 | GB | ripencc |
2003-04-28 | 1085 | ZEN-AS Zen Internet
17964 | 124.207.41.198 | 124.207.0.0/18 | CN | apnic |
2006-03-31 | 1264 | DXTNET Beijing Dian-Xin-Tong Network
Technologies Co., Ltd.
24138 | 222.35.136.31 | 222.35.136.0/21 | CN | apnic |
2003-09-02 | 4970 | CRNET_BJ_IDC-CNNIC-AP China Tietong
Telecommunication Corporation
25346 | 82.133.108.218 | 82.133.0.0/17 | GB | ripencc |
2003-08-27 | 975 | PIPEX-AS PIPEX Internet
31400 | 84.200.32.205 | 84.200.0.0/16 | DE | ripencc |
2004-04-28 | 1069 | ACCELERATED-IT Accelerated IT Services GmbH
These hosts like to be naughty in many ways. They've done the usual
Windows port scanning, three have been on IRC botnets, one ran a
phishing site, and the others have visited TCP 22 in their travels.
Thanks,
Rob.
Matthew.Swaar at us-cert.gov wrote:
> ----------- nsp-security Confidential --------
>
>
> Since ~1700 on 25 June the amount of TCP-23 (Telnet) scanning on our
> inbound interfaces has increased significantly:
>
>
> Date| Records| Bytes|
> Packets|
> 2008/06/24T00:00:00| 1064814.03| 163792334.33|
> 3058135.58|
> 2008/06/25T00:00:00| 9967115.49| 690683790.61|
> 11870293.71| (increase begins ~1700GMT)
> 2008/06/26T00:00:00| 12572983.34| 859897554.33|
> 14698986.43|
> 2008/06/27T00:00:00| 16471860.29| 1141522841.49|
> 19386825.67|
> 2008/06/28T00:00:00| 12806202.84| 885557115.53|
> 15117566.40|
> 2008/06/29T00:00:00| 14205931.86| 966273992.43|
> 16498154.88|
> 2008/06/30T00:00:00| 8261322.00| 578007237.00|
> 9839865.00| (Partial, only 16/24 hours)
>
>
> Doesn't appear to be interest in just us, either:
> http://www.incidents.org/port.html?port=23
>
>
> I'm working on comparing Ips across multiple days, see if it's a
> relatively static handful doing this. The traffic appears to be mostly
> 60bpp SYN scanning, with some SYN-RST thrown in.
>
> Anyone have a theory about what prompted this?
>
> V/R,
> Matt Swaar
> US-CERT Analyst
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
--
Rob Thomas
Team Cymru
The WHO and WHY team
http://www.team-cymru.org/
More information about the nsp-security
mailing list