I received the following message from our ASG220;
---------- Snip ------------
Intrusion Protection Alert
An intrusion has been detected. The packet has been dropped automatically.
You can toggle this rule between "drop" and "alert only" in WebAdmin.
Details about the intrusion alert:
Message........: BACKDOOR fkwp 2.0 runtime detection - connection success
Details........: http://www.snort.org/pub-bin/sigs.cgi?sid=6033
Time...........: 2008:03:06-14:05:31
Packet dropped.: yes
Priority.......: 1 (high)
Classification.: A Network Trojan was detected IP protocol....: 6 (TCP)
Source IP address: 192.168.1.1 (firewall.polese.com)
- http://www.dnsstuff.com/tools/ptr.ch?ip=192.168.1.1
- http://www.ripe.net/perl/whois?query=192.168.1.1
- http://ws.arin.net/cgi-bin/whois.pl?queryinput=192.168.1.1
- http://cgi.apnic.net/apnic-bin/whois.pl?search=192.168.1.1
Source port: 8110
Destination IP address: 192.168.1.176
- http://www.dnsstuff.com/tools/ptr.ch?ip=192.168.1.176
- http://www.ripe.net/perl/whois?query=192.168.1.176
- http://ws.arin.net/cgi-bin/whois.pl?queryinput=192.168.1.176
- http://cgi.apnic.net/apnic-bin/whois.pl?search=192.168.1.176
Destination port: 51824
---------- Snip ------------
It seems odd to me that the “Source IP address” is the firewall itself, does this make sense to any of you?
- Hamilton
This thread was automatically locked due to age.