Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Numerous ET SCAN Potential SSH Scan OUTBOUND alerts. Is Pfsense infected?

    Scheduled Pinned Locked Moved IDS/IPS
    28 Posts 8 Posters 15.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • chromefinchC
      chromefinch
      last edited by

      I'm getting the same thing, Seems to be crawling through the IP's. Really worrisome as I host a site for my wife's Co.
      Has the rebuild fixed it? Are you sure you still have the alert enabled?

      Member of the 'emerging scan rules':
      SID 2003068
      https://docs.emergingthreats.net/bin/view/Main/2003068

      1 Reply Last reply Reply Quote 0
      • B
        boobletins
        last edited by

        How many times per minute are you seeing this? You're sure it isn't a result of you attempting to make an ssh connection 5 times in a 2 minute window?

        1 Reply Last reply Reply Quote 0
        • B
          boobletins
          last edited by

          Also, could you paste the output from the command line sockstat | grep ":22"

          1 Reply Last reply Reply Quote 0
          • chromefinchC
            chromefinch
            last edited by

            0_1546637981852_Screen Shot 2019-01-04 at 4.39.08 PM.png

            1 Reply Last reply Reply Quote 0
            • chromefinchC
              chromefinch
              last edited by

              @boobletins said in Numerous ET SCAN Potential SSH Scan OUTBOUND alerts. Is Pfsense infected?:

              sockstat | grep ":22"

              Thanks for the quick response, here is what the command yielded, what am I looking at?
              ? ? ? ? tcp4 192.168.2.1:20356 192.168.2.23:22
              ? ? ? ? tcp4 192.168.1.8:54310 192.168.1.24:22
              ? ? ? ? tcp4 192.168.1.8:54312 192.168.1.24:22

              1 Reply Last reply Reply Quote 0
              • B
                boobletins
                last edited by boobletins

                Those question marks are in the original output? And you're running that from the pfSense command line?

                The command should be showing you which process has open sockets on port 22. We're hoping whatever process is scanning will show up there to try to get an indication of what is going on.

                chromefinchC 1 Reply Last reply Reply Quote 0
                • chromefinchC
                  chromefinch @boobletins
                  last edited by

                  @boobletins 0_1546638255655_Screen Shot 2019-01-04 at 4.44.05 PM.png

                  1 Reply Last reply Reply Quote 0
                  • B
                    boobletins
                    last edited by

                    Can you check chat for me? It will be faster.

                    chromefinchC 1 Reply Last reply Reply Quote 1
                    • B
                      boobletins
                      last edited by

                      chromefinch had previously had ntop-ng installed but only recently re-enabled suricata.

                      sockstat | grep ":22" output from the ui did not generate helpful output.

                      He re-enabled ssh access for himself and sockstat | grep ":22" generated output similar to below:

                      root ntopng 15017 45 tcp4 x.x.x.x:33912 57.151.10.72:22
                      

                      ntop was likely scanning what it thought was an internal network for sshd servers (though I have no experience with ntop on pfsense) -- he's following up in the ntop forums.

                      lambro690 -- I wonder if you had something similar going on?

                      L 1 Reply Last reply Reply Quote 2
                      • chromefinchC
                        chromefinch @boobletins
                        last edited by

                        @boobletins Thanks for your help!!!! I disabled the ntop wan interface and No more alerts!

                        bmeeksB 1 Reply Last reply Reply Quote 1
                        • bmeeksB
                          bmeeks @chromefinch
                          last edited by

                          @chromefinch said in Numerous ET SCAN Potential SSH Scan OUTBOUND alerts. Is Pfsense infected?:

                          @boobletins Thanks for your help!!!! I disabled the ntop wan interface and No more alerts!

                          So your firewall was infected -- but with ntop instead of a trojan ... ☺ . (Just kidding).

                          1 Reply Last reply Reply Quote 1
                          • L
                            lambro690 @boobletins
                            last edited by

                            @boobletins Yup lol I sure did have ntop installed. Must have been a bug with the package because I haven't gotten anything since the reinstall. Now I will know what to look out for!

                            Great work guys. That makes me feel a little bit better about my security :p

                            Gigabyte J1900N-D3V with on board Celeron - 4gb Ram - 250gb HDD - 1U Rack mount Case

                            1 Reply Last reply Reply Quote 0
                            • S
                              smokers
                              last edited by

                              I'm having same issue with ntop .. .. seems to try ip's like 0.106.219.157...
                              installed, reinstalled several times. ... anyone might know what is the issue?

                              1 Reply Last reply Reply Quote 0
                              • NyarlathotepN
                                Nyarlathotep
                                last edited by

                                This post is deleted!
                                1 Reply Last reply Reply Quote 0
                                • ontzuevanhussenO
                                  ontzuevanhussen @lambro690
                                  last edited by

                                  @lambro690 Same like me, but I prepared to protect my firewall with pivate and public key, and limit access to my firewall with SSHd Key Only > Public Key Only.

                                  2f010b5d-a271-4826-8107-5d2a960adba6-image.png

                                  Z 1 Reply Last reply Reply Quote 0
                                  • Z
                                    zimnysbrain
                                    last edited by zimnysbrain

                                    I have the same problem and even more dangerous behavior from pF after latest ntop update. Even my avahi demon send mdns externally!
                                    I'm on the latest pF 2.5 btw.

                                    I found this is due ntop bag and resolved by turning off hosts discovery in ntop itself.
                                    If you are affected is easy to check after ntop update by visiting ntop host details page where you will see a lot of errors.

                                    I also added all my local networks under the ntop settings in pF.

                                    This stop pF from crazy behavior with this snort allert, mdns and also fixed host details page in ntop itself.

                                    I think this ntop bug affecting only folks with WAN enabled under ntop setting in pF but didn't check that.

                                    Annoying thing is that after rebooting your pF you need go to ntop setting page in pf and just clink save all settings again.

                                    1 Reply Last reply Reply Quote 0
                                    • Z
                                      zimnysbrain @ontzuevanhussen
                                      last edited by

                                      @ontzuevanhussen

                                      I have the same problem and more dangerous behaviour from pF after latest ntop update. Even my avahi demon send mdns externally!
                                      I'm on the latest pF 2.5 btw.

                                      I found this is due ntop bag and resolved by turning off hosts discovery in ntop itself.
                                      If you are affected it is easy to check after ntop update by visiting ntop host details page where you will see a lot of errors. This behaviour is discovered even you not using ssh on your pF so changing logging behaviour don't make sense.

                                      I also added all my local networks under the ntop settings in pF.

                                      This stop pF from crazy behaviour with this snort allert, mdns and also fixed host details page in ntop itself.
                                      Don't have time enough to check if all this mess really go outside or just happened on localhost interface with ntop.

                                      If still not updated bug you can contribute on freeBSD forum for it.

                                      I think this ntop bug affecting only folks with WAN enabled under ntop setting in pF but didn't check that.

                                      Annoying thing is that after rebooting your pF you need go to ntop setting page in pf and just clink save all settings again.

                                      Final conclusion is if you have any package wrong configured on your pF then you can become in internet even like an attacker regardless you are reseeding not your own traffic.
                                      Maybe good way to truly test all updates on pF platform :) not simply fork them.

                                      How you run the process is important too because I feel ashamed a bit that my pF firewall became unaware that behave like a worm for resident and friendly network by simply copy redundant traffic across interfaces because one of the distributed packages wasn't test enough.

                                      Form me personal interesting in this is how you are utilise your pF when this can become dodgy for your network. All about is use the tools, analyze the logs and do the tests :)

                                      I love pF btw always my recommendation like you can see in open source we can resolve a lot annoying problems. :)

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.