This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Intrusion Protection Alert

I received the following message from our ASG220;

---------- Snip ------------

Intrusion Protection Alert

An intrusion has been detected. The packet has been dropped automatically.
You can toggle this rule between "drop" and "alert only" in WebAdmin.

Details about the intrusion alert:

Message........: BACKDOOR fkwp 2.0 runtime detection - connection success
Details........: http://www.snort.org/pub-bin/sigs.cgi?sid=6033
Time...........: 2008:03:06-14:05:31
Packet dropped.: yes
Priority.......: 1 (high)
Classification.: A Network Trojan was detected IP protocol....: 6 (TCP)

Source IP address: 192.168.1.1 (firewall.polese.com)
http://www.dnsstuff.com/tools/ptr.ch?ip=192.168.1.1
http://www.ripe.net/perl/whois?query=192.168.1.1
http://ws.arin.net/cgi-bin/whois.pl?queryinput=192.168.1.1
http://cgi.apnic.net/apnic-bin/whois.pl?search=192.168.1.1
Source port: 8110
Destination IP address: 192.168.1.176
http://www.dnsstuff.com/tools/ptr.ch?ip=192.168.1.176
http://www.ripe.net/perl/whois?query=192.168.1.176
http://ws.arin.net/cgi-bin/whois.pl?queryinput=192.168.1.176
http://cgi.apnic.net/apnic-bin/whois.pl?search=192.168.1.176
Destination port: 51824

---------- Snip ------------


It seems odd to me that the “Source IP address” is the firewall itself, does this make sense to any of you?

- Hamilton


This thread was automatically locked due to age.
Parents Reply Children
No Data