Port 53 hit every hour

Port 53 hit every hour

Post by Steve Terrel » Wed, 22 Nov 2000 04:00:00



I have seen in my log files where port 53 has been probed for the last 2
days EVERY hour. A sample excerpt follows:

Nov 21 07:29:16 xxx kernel: Packet log: input DENY eth0 PROTO=17
208.184.4.142:*446 24.168.xxx.xxx:53 L=73 S=0x00 I=1 F=0x0000 T=42 (#38)

Why is this machine constantly knocking on my door? and what is it likely
looking for?

Thanks for any replys.

Steve Terrell

 
 
 

Port 53 hit every hour

Post by Manfred Bart » Wed, 22 Nov 2000 04:00:00



> I have seen in my log files where port 53 has been probed for the last 2
> days EVERY hour. A sample excerpt follows:

> Nov 21 07:29:16 xxx kernel: Packet log: input DENY eth0 PROTO=17
> 208.184.4.142:*446 24.168.xxx.xxx:53 L=73 S=0x00 I=1 F=0x0000 T=42 (#38)

I get lots of them too.  Most likely whole subnets are scanned by this
perpetrator, not just you.  A while ago I noticed that many of these
attempts came from one particular network, so I complained to the
admin and the attemps from that subnet stopped.

$ whois 208.184.4.142
Abovenet Communications, Inc. (NETBLK-ABOVENET-6)
   50 W. San Fernando St., Suite 1010
   San Jose, CA 95113
   US
   Netname: ABOVENET-6
   Netblock: 208.184.0.0 - 208.185.255.255


include your logs of connection attempts from their network.

Quote:> Why is this machine constantly knocking on my door? ...

it likes you and wants to come in <grin>

Quote:> ... and what is it likely looking for?

A root exploit in an old versions of named (bind).  Once they are
in they'd like to ``borrow'' your system to crack more systems or
to run distributed DOS attacks etc...

--
Manfred

 
 
 

Port 53 hit every hour

Post by BB » Wed, 22 Nov 2000 04:00:00


port 53 is DNS. You get the connection using TCP which is intended for zone
transfers (UDP is for normal DNS lookups). Most likely someone miconfigured
their DNS server and it tries to do a zone transfer from your DNS server. I
don't think it's an attack but it is still worth notifying the administrator
of the source machine.

Bob


Quote:> I have seen in my log files where port 53 has been probed for the last 2
> days EVERY hour. A sample excerpt follows:

> Nov 21 07:29:16 xxx kernel: Packet log: input DENY eth0 PROTO=17
> 208.184.4.142:*446 24.168.xxx.xxx:53 L=73 S=0x00 I=1 F=0x0000 T=42 (#38)

> Why is this machine constantly knocking on my door? and what is it likely
> looking for?

> Thanks for any replys.

> Steve Terrell

 
 
 

Port 53 hit every hour

Post by craw.. » Wed, 22 Nov 2000 04:00:00



> I have seen in my log files where port 53 has been probed for the last 2
> days EVERY hour. A sample excerpt follows:

> Nov 21 07:29:16 xxx kernel: Packet log: input DENY eth0 PROTO=17
> 208.184.4.142:*446 24.168.xxx.xxx:53 L=73 S=0x00 I=1 F=0x0000 T=42 (#38)

> Why is this machine constantly knocking on my door? and what is it likely
> looking for?

> Thanks for any replys.

> Steve Terrell

Nice probe. How long have you been monitoring your logs? IOW, is this a
new? As various version of bind/named have been a known exploit, any
probe for port 53 obviously raises a bunch of red flags. OTOH, probes
for 53 may be of a different source for information. Check out this
report from the GIAC/SANS report.

http://www.sans.org/y2k/042700.htm

Search a little past half-way down for what USA Today was doing.

I'm perplexed by the hour long probe for a DNS as well as Manfred's post
about probes from abovenet. I'm also perplexed by I=1. If I represents
the packet id number, then ID=1 is rather strange.

 
 
 

Port 53 hit every hour

Post by Steve Terrel » Fri, 24 Nov 2000 04:00:00




>> I have seen in my log files where port 53 has been probed for the last
>> 2 days EVERY hour. A sample excerpt follows:

>> Nov 21 07:29:16 xxx kernel: Packet log: input DENY eth0 PROTO=17
>> 208.184.4.142:*446 24.168.xxx.xxx:53 L=73 S=0x00 I=1 F=0x0000 T=42
>> (#38)

>> Why is this machine constantly knocking on my door? and what is it
>> likely looking for?

>> Thanks for any replys.

>> Steve Terrell

> Nice probe. How long have you been monitoring your logs?

Always monitor logs

Quote:> IOW, is this a new?

Started on Nov 20

Quote:> As various version of bind/named have been a known exploit, any
> probe for port 53 obviously raises a bunch of red flags. OTOH, probes
> for 53 may be of a different source for information. Check out this
> report from the GIAC/SANS report.

> http://www.sans.org/y2k/042700.htm

> Search a little past half-way down for what USA Today was doing.

> I'm perplexed by the hour long probe for a DNS as well as Manfred's post
> about probes from abovenet. I'm also perplexed by I=1. If I represents
> the packet id number, then ID=1 is rather strange.

Probes are not an hour long, they happen at hour intervals.

Thanks, Steve

 
 
 

1. many hits to port 53

Maybe someone can shed some light. I have blocked APNIC, RIPE assigned
numbers, and more from access to my servers (Linux 2.2.16) as anything from
those areas is bound to be spam/suspicious anyhow. And I started to log
these lines from ipchains. I'm seeing hits at the rate of 40-60 per minute
from those areas attempting access to my name servers. Is this normal? Or
not? Small system I run for a few friends. Nothing controversial, etc. Just
about 8 e-mail accounts.

And it has increased tremendously, like four fold, in the last few months.

george at dyb dot com

-G

--
George J Csahanin
Director of Engineering and Operations
LIN Television
Austin, TX
512-703-5396 voice
512-481-1233 private fax

2. Red Hat 5.2 Raid-1 Problem

3. snort and port 53 <-> 53 false positives

4. ddd (Data Display Debugger) binary for ELF ?

5. Questions on the purpose of port 53 "domain port" and 6013

6. Need help installing 2nd HD

7. purpose of port 53 "domain port"

8. Time log of web page

9. allowing 53 to 53 bad ?

10. hpux shell script using a for loop for every hour of every day

11. tcp 53 and udp 53

12. Code Red / TCP port 80 probe frequency DOUBLING every two hours?