Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall UDP ? Attack !! Or Normal ?

    Scheduled Pinned Locked Moved Firewalling
    79 Posts 9 Posters 13.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User @SteveITS
      last edited by A Former User

      @steveits 81f68690-380a-4dc3-bb1e-df1a2e2a2f77-image.png

      @johnpoz

      tracert from other ISP To my IP WAN

      I think I did not explain myself well, sorry, when my ip wan is traced, a domain vpn2.med.com.do is shown like this

      So when I do a tracer to this domain vpn2.med.com.do it shows a wan ip 179.51.66.42

      this domain and this ip wan are not mine I do not recognize it!

      at the end of the day thanks to my curiosity I found a bug, I already knew that it was not normal to see this traffic sent to 33434 in my wan.

      S johnpozJ 2 Replies Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @A Former User
        last edited by

        @silence said in Firewall UDP ? Attack !! Or Normal ?:

        when my ip wan is traced, a domain vpn2.med.com.do is shown

        That's the reverse DNS (PTR record) and is up to the ISP to set a hostname. I've seen several cases over the years where a client gets an IP from an ISP and it has an old hostname. Heck, I've forgotten to update the PTR record once or twice on servers we host.

        Run "nslookup -type x.x.x.x" with your WAN IP and if I understand your posts correctly it will return the vpn2.med.com.do name. Not much you can do about it other than ask your ISP to remove it. Most either do without or put in something generic by default.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @A Former User
          last edited by johnpoz

          @silence @SteveITS ok I get a PTR or forward being wrong.. But now this 2nd trace is all rfc1918 address space?

          Other than hop 2 and hop 9? your hiding.. So now even more confused ;) hehehe

          Would you mind sharing what your public IP is via a message to me? So its not public - but if they fix that fqdn, you understand anyone will be able to lookup your IP.. So maybe you want to hide that as well?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          ? S 2 Replies Last reply Reply Quote 0
          • ?
            A Former User @johnpoz
            last edited by

            @johnpoz

            This is just traffic received without any client using this wan, so all this comes from the noise in 33434.

            ff17452a-7cf5-4e73-af72-4402463b5873-image.png

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @A Former User
              last edited by

              @silence 33Mbps - yeah that sure seems quite excessive..

              Still trying to understand your setup and your mention of some fqdn which I take is yours not resolving to your IP? If its not resolving to yours.. Then how could it generate traffic to you?

              179.51.66.42 no is my ip

              Then your latest traceroute is all rfc1918 address space? Other maybe 2 hops?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @johnpoz
                last edited by

                @johnpoz said in Firewall UDP ? Attack !! Or Normal ?:

                trace is all rfc1918 address space

                Maybe "within" the VPN service?

                @silence said in Firewall UDP ? Attack !! Or Normal ?:

                traffic received without any client using this wan

                Oh, that's noticeable then. The original log image was a handful of packets every few seconds. 33 Mbit/s has to be way more than that... (and I definitely wouldn't log it)

                Are you using a VPN to connect out from/on pfSense? If you disconnect that what happens?

                Here's a wild theory, did your WAN IP belong to a VPN company? And this is something/someone still trying to connect to it? If that's the case there may not be much you can do except contact your ISP to block the traffic. If it's all on one port that shouldn't be that hard, if they can/will do it. Lead with the 33 Mbit/s. :) Or maybe they can give you a new IP and let this one sit on the shelf for a while.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                GertjanG 1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @SteveITS
                  last edited by Gertjan

                  @steveits said in Firewall UDP ? Attack !! Or Normal ?:

                  Are you using a VPN to connect out from/on pfSense

                  In that case, the case is closed.

                  The IP you get from a VPN is never .... "not new, made for you, and has no usage history".
                  IP are recycled among users, have a history, and because it's from an VPN ISP, it has been used for horrible things, or worse.
                  If your IP was used just before you got it by you by some bad-ass 'let's go attack all 3 letter agencies" hacker-wannabee, then yeah, you will see a lot of activity on your IP. Some one want to know where you are, as they didn't figured out yet some one else is hiding behind the IP.

                  If you want a clean(er) IP from a VPN ISP ? That's possible. I bet the more expensive ones proposes more proposes (read : less abused) IP's.

                  If you use a VPN IP, then follow this excellent advise :

                  @steveits said in Firewall UDP ? Attack !! Or Normal ?:

                  (and I definitely wouldn't log it)

                  Btw : I'm still curious about what the traffic actually is, what it contains. But if its TLS wrapped up, or, has no payload at all, again, ditch it. Live is already to short.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @Gertjan
                    last edited by

                    @gertjan said in Firewall UDP ? Attack !! Or Normal ?:

                    I'm still curious about what the traffic actually is

                    Yeah same here - he did post a pcap with the payload.. I posted what I saw in some of them.. It is odd traffic to be sure. And the TTLs on the packets are also odd.. From the TTLs you would think traceroute, but they don't seem to be changing correctly, and the port not changing - unless he was missing the parts of the traffic in his sniff.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    ? 1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User @johnpoz
                      last edited by A Former User

                      @johnpoz @Gertjan @SteveITS

                      Ok I will try to explain as best as possible, and sorry for my bad English (I really only speak Spanish)

                      Well I have a year running everything fine in pfsense using an internet provider.

                      but 1 month ago I decided to add a new internet provider for redundancy purposes.

                      Well, this is the situation, the fiber that I receive from this Internet provider is directly connected to Proxmox (I have several Pfsense here)

                      I created a new pfsense for this new internet provider, they offer me the ip 1.2.3.4/29, I configured everything and everything was fine, the service went up without problem... I created the firewall rule normally as I am used to...

                      I started noticing strange traffic to the same port 33434 but I ignored it.

                      when it came time to actually use this redundancy and my ISP 1 Failed.

                      I moved about 200 clients to My New Pfsense with the new wan/29 as they started telling me they felt a bit slow.

                      which was very strange because in the previous pfsense with the previous isp they had the exact same internet speed and it was never slow.

                      Well, in the end I moved all this client to the old pfsense with my old Wan and everything works great.

                      Now Monitoring the incoming traffic of my WAN interface (TO MY MAIN IP) a lot of packets arrive at port 33434 UDP As you could see in the previous photo abc exceeds 30mbps which is very high for normal internet traffic.

                      Well, I investigated, I used my other WAN to do an nslookup to my New IP And I discovered the following in name: it shows vpn2.med.com.do

                      56c46a96-f50c-4a01-967a-38888127eb5d-image.png

                      so I did another nslookup to this name vpn2.med.com.do and it shows me the following IP 179.51.66.42

                      d2bee8c5-b434-48f4-b749-5bfadb80a599-image.png

                      As you can see, something is not right, so I told my new isp about this, but I still haven't gotten a response.

                      the thing is that this service is impossible to use in this way.

                      That's why at the beginning of the publication I asked this, is it normal? or am I under a ddos ​​attack?

                      In case you are wondering, where does this traffic come from because they come from everywhere, at the beginning I only saw a network 157.185.0.0/16 now I see any IP pointing to 33434 or 33224

                      d448fd2a-c9cd-4c16-b752-0fef1f4737be-image.png

                      By the way, here I leave my dashboard in case it is important.

                      637e17e4-a644-4cd2-885d-36d0dbe83fd2-image.png

                      @stephenw10 I would like to hear your opinion on this.

                      I did a nat just to capture this on my pc directly.

                      nat.pcapng

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        SteveITS Galactic Empire @A Former User
                        last edited by

                        @silence said in Firewall UDP ? Attack !! Or Normal ?:

                        am I under a ddos ​​attack?

                        A DoS attack is usually much higher volume and I would think be on other ports like 80/443. Normally a DoS attack's goal is to connect to some service (like a web server or DNS server) and make the service respond, to keep the server busy.

                        I think your ISP needs to answer the questions:

                        1. can they block the traffic?
                        2. was your IP being used by someone else, perhaps a VPN provider?

                        A similar example is that most phone companies won't immediately re-use a phone number. They wait a while so the new customer doesn't get calls for the old customer.

                        Random traffic probing any IP connected to the Internet is normal; they are scanning all IPs on the Internet looking for servers to exploit. A high volume of traffic coming to one specific port is not normal.

                        I would definitely not log each packet, that's just unnecessary CPU time and SSD write life wear.

                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                        Upvote 👍 helpful posts!

                        ? 2 Replies Last reply Reply Quote 0
                        • ?
                          A Former User @SteveITS
                          last edited by

                          @steveits said in Firewall UDP ? Attack !! Or Normal ?:

                          was your IP being used by someone else, perhaps a VPN provider?

                          Investigating myself, it seems to me that if the old owner of the IP offered vpn service and apparently all his clients try to connect.

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User @SteveITS
                            last edited by A Former User

                            @steveits said in Firewall UDP ? Attack !! Or Normal ?:

                            can they block the traffic?

                            I am more interested in the case of nslookup

                            I did the same process with the other ip of my service of /29 and there are only 2 ip of this that show this behavior when I do nslookup

                            I am sure that if you solve this... I should no longer receive this type of traffic and it is much better than canceling my rule, because I am really interested in registering all types of UDP in my wan

                            S bingo600B 2 Replies Last reply Reply Quote 0
                            • S
                              SteveITS Galactic Empire @A Former User
                              last edited by

                              @silence The incorrect reverse DNS/PTR record isn't going to hurt you though, it is just incorrect. Unless you have a mail server on your LAN, in which case some/many mail servers on the Internet demand the forward and reverse DNS lookups match, in an effort to block spammers.

                              To log other UDP, you could make a rule above that rule:

                              block UDP on WAN:33224, do not log
                              block UDP on WAN, log

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              1 Reply Last reply Reply Quote 1
                              • bingo600B
                                bingo600 @A Former User
                                last edited by bingo600

                                @silence

                                Yupp

                                Something seems a bit fishy with the PTR's

                                $ host  1.2.3.4
                                4.3.2.1.in-addr.arpa domain name pointer vpn2.med.com.do.
                                
                                $ host 179.51.66.42
                                42.66.51.179.in-addr.arpa domain name pointer vpn2.med.com.do.
                                
                                $ host vpn2.med.com.do
                                vpn2.med.com.do has address 179.51.66.42
                                
                                

                                Do you own (use) both of these ip's , i mean primary line vs secondary ?

                                If you find my answer useful - Please give the post a 👍 - "thumbs up"

                                pfSense+ 23.05.1 (ZFS)

                                QOTOM-Q355G4 Quad Lan.
                                CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                ? 1 Reply Last reply Reply Quote 0
                                • ?
                                  A Former User @bingo600
                                  last edited by A Former User

                                  @bingo600 said in Firewall UDP ? Attack !! Or Normal ?:

                                  1.2.3.4

                                  This is my real wan ip can you put 1.2.3.4 please? XD

                                  bingo600B 1 Reply Last reply Reply Quote 0
                                  • bingo600B
                                    bingo600 @A Former User
                                    last edited by

                                    @silence said in Firewall UDP ? Attack !! Or Normal ?:

                                    @bingo600 said in Firewall UDP ? Attack !! Or Normal ?:

                                    1.2.3.4

                                    This is my real wan ip can you put 1.2.3.4 please? XD

                                    Done ...
                                    It wasn't me that posted a tonn of those "real" IP's in the pict here
                                    https://forum.netgate.com/post/1028590

                                    If you find my answer useful - Please give the post a 👍 - "thumbs up"

                                    pfSense+ 23.05.1 (ZFS)

                                    QOTOM-Q355G4 Quad Lan.
                                    CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                    LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                    ? 1 Reply Last reply Reply Quote 0
                                    • ?
                                      A Former User @bingo600
                                      last edited by A Former User

                                      @bingo600 said in Firewall UDP ? Attack !! Or Normal ?:

                                      It wasn't me that posted a tonn of those "real" IP's in the pict here

                                      lol sorry, So what else can I do?

                                      bingo600B 1 Reply Last reply Reply Quote 0
                                      • bingo600B
                                        bingo600 @A Former User
                                        last edited by bingo600

                                        @silence
                                        I would start by getting the DNS reverse pointer that is in error fixed.
                                        Should your "real ip" reverse resolve to that : vpn2.med.com.do name ?
                                        Else contact the ALTICE or TRICOM ISP that controls the PA range you have been assigned , to get that fixed.
                                        That might not stop the noise, as PTR's usually aren't used much But it's still an error, if it's not your domain.

                                        Edit: have them fix the .200 PTR too.

                                        And see if the noise is gone.

                                        My guess is that it probably isn't ...
                                        The name it resolves to : vpn2.med.com.do
                                        Might indicate that someone might be trying to connect to the IP address (hardcoded) for vpn usage.

                                        If that is what is happening , you should ask the ISP for another /29 range.

                                        If you find my answer useful - Please give the post a 👍 - "thumbs up"

                                        pfSense+ 23.05.1 (ZFS)

                                        QOTOM-Q355G4 Quad Lan.
                                        CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                        LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                        ? 1 Reply Last reply Reply Quote 0
                                        • ?
                                          A Former User @bingo600
                                          last edited by

                                          @bingo600 said in Firewall UDP ? Attack !! Or Normal ?:

                                          Should your "real ip" reverse resolve to that : vpn2.med.com.do name ?

                                          here it should show something like reserved-ipwan-200.tricom.net

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @A Former User
                                            last edited by

                                            @silence could you please PM me (send me a private message) Click my avatar and start conversation. With what you actual IP is - I would like to look up the ptr for it, and other info I can glean from this IP. Also are you saying this vpn2.med.com.do is suppose to point to your real IP, and its pointing to some other IP..

                                            I did stop for a few beers tonight with buddy - so that might be my problem, but still confused about your traces and what is suppose to point to what from a fqdn or ptr point of view ;)

                                            If your seeing 33Mbps to your IP no matter what the port is from just "noise" that seems excessive for sure. But as others have mentioned - when some ISP gives you an IP - it could come with baggage. You don't know what that IP was used for in the past, and you could have other users or companies still trying to hit it, etc. that other port 33224 is that udp or tcp - that is unassigned.. It's not a port actually assigned to anything specific.. So yeah that is odd traffic for sure. But that 200.88 IP is a do (Compañía Dominicana de Teléfonos S. A) IP.. Which at least the region of the world I believe your in.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            ? 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.