Take a look at the following four alerts from my ASL 5.203 system
2005:06:02-01:43:06 (none) snort[12534]: [1:2925:0] D INFO web bug 0x0 gif attempt [Classification: Misc activity] [Priority: 3]: {PROTO006} 38.113.220.8:80 -> 24.41.50.233:58338
2005:06:02-01:43:36 (none) snort[12534]: [1:2925:0] D INFO web bug 0x0 gif attempt [Classification: Misc activity] [Priority: 3]: {PROTO006} 64.236.44.54:80 -> 24.41.50.233:58481
2005:06:02-02:00:50 (none) snort[12534]: [1:1199:0] D WEB-MISC Compaq Insight directory traversal [Classification: Web Application Attack] [Priority: 1]: {PROTO006} 10.1.1.2:8080 -> 10.1.1.5:2301
2005:06:02-02:00:50 (none) snort[12534]: [1:1199:0] D WEB-MISC Compaq Insight directory traversal [Classification: Web Application Attack] [Priority: 1]: {PROTO006} 10.1.1.2:8080 -> 10.1.1.5:2301
It appears that one of the following is true:
1) The source of attcks is randomly alternated between the address of the application proxy (ASL) & the true source IP address of the attacker.
2) ASL has been compromised and in fact, the ASL firewall is the source of an attack.
Can someone help me figure this out?
This thread was automatically locked due to age.