Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Need to find the origin of this traffic BAD-TRAFFIC Conficker.

    Scheduled Pinned Locked Moved pfSense Packages
    4 Posts 3 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H Offline
      hdavy2002
      last edited by

      Hi all,

      I must all for helping me out so far. To be honest this is the best community I have come across.

      I have snort listening on the WAN side. I can see some external ip's getting blocked and have plenty of alerts. What confused me was the alert below:

      06/09-20:50:39.667417 [ ** ] [ 3:15450:2 ] BAD-TRAFFIC Conficker C/D DNS traffic detected [ ** ] [ Classification: A Network Trojan was detected ] [ Priority: 1 ] {UDP} Firewall IP/my gateway:51806 -> 208.67.222.222:53

      I can see that some pc in my network generated Conficker traffic. and it is going to an external ip. How do I figure out which PC in my network caused it?

      I tried using snort on LAN and WAN and my firewall went crazy, I had to reboot it and disable lan.

      Thanks all.

      1 Reply Last reply Reply Quote 0
      • jimpJ Offline
        jimp Rebel Alliance Developer Netgate
        last edited by

        You will need snort to listen on the LAN to track this down.

        Listening on WAN and LAN should be ok, but will be resource-intensive. At least it used to work, I haven't tried it lately.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • H Offline
          hdavy2002
          last edited by

          @jimp:

          You will need snort to listen on the LAN to track this down.

          Listening on WAN and LAN should be ok, but will be resource-intensive. At least it used to work, I haven't tried it lately.

          That probably explains why my firewall freezed on me when I turned the LAN/WAN on.

          1 Reply Last reply Reply Quote 0
          • K Offline
            ktims
            last edited by

            A kludge might be, if you catch it in the log fast enough, to check the state table and see which machine(s) is/are getting nat'd out to port 51806, though since this is DNS traffic it might be going through the DNS forwarder.

            You could also just scan your network for Conficker-infected hosts, apparently nmap's script for this is fairly reliable. See the post on the nmap page about scanning for Conficker.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.