This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Trojan / worm question

The ASL firewalls I have in several locations appear to be initiating and listening for NetBus type connections, as shown in this display:

tcp        0      0 127.0.0.1:12345         0.0.0.0:*               LISTEN      
tcp        0      0 0.0.0.0:1723            0.0.0.0:*               LISTEN      
tcp        0      0 0.0.0.0:443             0.0.0.0:*               LISTEN      
tcp        0      0 127.0.0.1:12345         127.0.0.1:35344         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35345         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35346         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35347         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35348         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35349         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35350         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35351         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35352         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35353         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35354         TIME_WAIT   
tcp        0      0 127.0.0.1:12345         127.0.0.1:35355         TIME_WAIT   

Anyone have a comment on this ? It doesn't look right to me - is there a problem or am I missing something ?

Thanks,

Mike


This thread was automatically locked due to age.
Parents Reply Children
No Data