Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall not blocking hacker IP

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    10 Posts 7 Posters 5.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      cjbujold
      last edited by

      Checking this morning the pftop and noticed an IP that should not be connected.  Originally we had no rule opening port 5060, we have since added rules to block port 5060 and another rule to specifically block the incoming IP in question, yet this hacker from korea is still able to connect.  I even rebooted after implementing the rules and he is still getting connected.

      How can I block him permanently.

      Attached is an image from pftop and the second image is the rules I set up.

      We are using:

      2.0-RC1 (i386)
      built on Sat Mar 12 01:18:33 EST 2011
      hacker1.png
      hacker1.png_thumb
      hacker2.png
      hacker2.png_thumb

      1 Reply Last reply Reply Quote 0
      • stephenw10S Offline
        stephenw10 Netgate Administrator
        last edited by

        This should be blocked by default.
        It is likely that something inside your network is opening this.
        Do you have upnp enabled?

        Steve

        Edit: port 5060 appears to be VOIP of some kind. Are you running something of that nature on thaat computer?

        1 Reply Last reply Reply Quote 0
        • A Offline
          Alan87i
          last edited by

          I had some aps on my WHS server that would call home and open a connection no matter what I tried . A couple different IP cams on the lan would call home as well.

          1 Reply Last reply Reply Quote 0
          • C Offline
            cjbujold
            last edited by

            The server 192.168.20.80 has been physically turned off and still getting this entry.

            1 Reply Last reply Reply Quote 0
            • W Offline
              wallabybob
              last edited by

              I believe you will see that entry until it times out. I on't know what the time out period is.

              Whats WAN2R? Could the access be coming in over that interface?

              1 Reply Last reply Reply Quote 0
              • T Offline
                tommyboy180
                last edited by

                I wanted to chime in and bring up the IP-Blocklist package. You can put that IP in the black list and not worry about it hitting you ever again.
                In fact there are several public lists that are maintained actively that contain hacker IP ranges and malicious ranges.

                I would consider using this package if you need to black list IPs at the firewall level.

                -Tom Schaefer
                SuperMicro 1U 2X Intel pro/1000 Dual Core Intel 2.2 Ghz - 2 Gig RAM

                Please support pfBlocker | File Browser | Strikeback

                1 Reply Last reply Reply Quote 0
                • C Offline
                  cmb
                  last edited by

                  @wallabybob:

                  Whats WAN2R? Could the access be coming in over that interface?

                  it's either coming in there, or is outbound traffic. It's not coming in WAN with that ruleset.

                  1 Reply Last reply Reply Quote 0
                  • W Offline
                    wallabybob
                    last edited by

                    @cmb:

                    @wallabybob:

                    Whats WAN2R? Could the access be coming in over that interface?

                    it's either coming in there, or is outbound traffic. It's not coming in WAN with that ruleset.

                    This raises the question for me: "How can one tell from the pftop output which party initiated the connection?"
                    For example, the posted pftop output says (in part):

                    PR   D   SRC                     DEST                 STATE   AGE    EXP
                    udp  I    115.144.181.36:5087      192.168.20.80:5060    2:2    1201   60
                    udp  O    115.144.181.36:5087      192.168.20.80:5060    2:2    1201   60

                    Should I read this as the SRC column giving the IP address which initiated the connection?
                    If so, then the displayed firewall state was created for a party on the internet not for a party on the LAN so it must have snuck around the firewall rule on WAN, either by coming on on a second interface connected to the interface OR its a stale display taken before the reboot after the firewall rule modification.

                    1 Reply Last reply Reply Quote 0
                    • C Offline
                      cjbujold
                      last edited by

                      Thanks for all the help,  I installed the IP-Block and it seems to be gone.  Also I think it did time out after a while.  I will continue to monitor.  The Wanr2 is a second connection which also has the firewall rules applied to block him out.

                      1 Reply Last reply Reply Quote 0
                      • ? This user is from outside of this forum
                        Guest
                        last edited by

                        I would also temporarily disable the port forward, and reset all states.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.