Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    [pfB_PRI1_v4] Too many alerts out for "196.55.215.129", 443, 5222

    pfBlockerNG
    5
    15
    1041
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      denis_ju last edited by

      Hi,

      i see today on my Reports/Alerts of pfBlockerNG v.3.0.0_8 too many alerts (over 45.000) in a few hours about this ip 196.55.215.129 on port 443, 5222 (outbonding) pointing to this domain "logicweb.com" by "https://www.abuseipdb.com".

      Anybody know what is going on with this IP?

      T 1 Reply Last reply Reply Quote 0
      • T
        Tzvia @denis_ju last edited by

        @rimaju Well, a quick look. Port 5222 is used by Jabber/XMPP, do you use Jabber? Logicweb.com is a webhosting company so it's something that maybe they host?

        D 1 Reply Last reply Reply Quote 1
        • D
          denis_ju @Tzvia last edited by

          @tzvia, no I don't use Jabber.
          I'm very confusing about this ip.

          Yesterday was about 1.2 milion alerts!!!!

          Today i disabled "Individual List Reputation", "Collective List Reputation", and no more such alerts!

          Gertjan 1 Reply Last reply Reply Quote 0
          • Gertjan
            Gertjan @denis_ju last edited by Gertjan

            @rimaju said in [pfB_PRI1_v4] Too many alerts out for "196.55.215.129", 443, 5222:

            alerts (over 45.000) in a few hours about this ip 196.55.215.129 on port 443, 5222 (outbonding)

            Outbounding : a local device, a device on your LAN(s) is hammering "196.55.215.129 " ?
            Wasn't there also the IP of the local device ?
            What about shuttingt down this device - cleaning it up - investigate it - as it uses a brain dead program (or owner) that doesn't take "no" for an answer. Act up onit (w(ll look the other way, don't worry) or, why not, live with it.
            If it isn't 'your' device, and you want trusted == well behaving devices on your network : cut the connection and done.

            You'll be doing a BIG favour to the web server at 196.55.215.129.

            @rimaju said in [pfB_PRI1_v4] Too many alerts out for "196.55.215.129", 443, 5222:

            Today i disabled "Individual List Reputation", "Collective List Reputation", and no more such alerts!

            Like closing your eyes and suddenly the issue isn't there any more ?

            D 2 Replies Last reply Reply Quote 1
            • D
              denis_ju @Gertjan last edited by

              @gertjan, you are absolutely right.
              I'm trying to understand/investigate the problem.

              I'm definitely not give up. But i need a little time.

              Alerts are comming from a smartphone, over wifi. But i have no idea what app is producing this traffic!!!

              1 Reply Last reply Reply Quote 0
              • D
                denis_ju @Gertjan last edited by

                @gertjan, can I intercept this behavior with a snort rule? If yes, what rule do you mean to activate?

                Just an idea.

                Gertjan 1 Reply Last reply Reply Quote 0
                • Gertjan
                  Gertjan @denis_ju last edited by

                  @rimaju

                  Can you show the issue ?
                  Isn't there a LAN (local !) IP listed ?

                  D 1 Reply Last reply Reply Quote 0
                  • D
                    denis_ju @Gertjan last edited by

                    @gertjan Not yet.
                    My wifi is a mikrotik on NAT. I see only the mikrotik ip on pfsense.

                    Gertjan 1 Reply Last reply Reply Quote 0
                    • Gertjan
                      Gertjan @denis_ju last edited by

                      @rimaju said in [pfB_PRI1_v4] Too many alerts out for "196.55.215.129", 443, 5222:

                      @gertjan Not yet.
                      My wifi is a mikrotik on NAT. I see only the mikrotik ip on pfsense.

                      Your AP is doing NAT ? Is it a router ?
                      Don't do that .... just have it doing AP. Shut down the rest (at first).

                      1 Reply Last reply Reply Quote 0
                      • O
                        Okijames last edited by

                        I noticed a ton (30K+ attempts in a few hours) of block alerts to the same address. This is from a phone I recently rooted and installed lineageos. With very few apps installed, I was able to whittle it down to Telegram, the FOSS version in fact.

                        I've uninstalled Telegram and the phone is no longer attempting to connect to 196.55.215.129.

                        Spamhaus has the 196.52.0.0/14 CIDR block listed here... https://www.spamhaus.org/sbl/query/SBL510704

                        My laptop, with Telegram installed, is also attempting to reach addresses in that CIDR block.

                        Gertjan 1 Reply Last reply Reply Quote 0
                        • Gertjan
                          Gertjan @Okijames last edited by

                          @okijames said in [pfB_PRI1_v4] Too many alerts out for "196.55.215.129", 443, 5222:

                          phone I recently rooted

                          Ah, nice. A typical school-example of what happens when rooted.
                          You have to answer the question : do you trust the root kit ?
                          Telegram accessing https ports ? Euh .......... right, it does : https://core.telegram.org/mtproto/transports
                          So it could be so that 196.55.215.129 is a front end CDN for telegram - and it's refusing your telegram phone app requests now. Better to check why if possible - maybe your root kit isn't that innocent.

                          O 1 Reply Last reply Reply Quote 0
                          • O
                            Okijames @Gertjan last edited by

                            @gertjan I never fully trust anything :)

                            The phone was well behaved before installing Telegram, and is back to being quiet now that Telegram has been removed. Though now I'm doing packet captures of its traffic, where I was only looking at flow and firewall logs before.

                            Stopping Telegram on my laptop has the same affect. No more connection attempts to the that address.

                            I should note that Telegram functioned normally, it doesn't appear these specific connections are required for normal operation.

                            1 Reply Last reply Reply Quote 0
                            • n3xus_x3
                              n3xus_x3 last edited by

                              I have the same problem, the smartphone does not have any type of root , the connections are many... , for now I leave it blocked, there is no disservice at the moment
                              block.png

                              O 1 Reply Last reply Reply Quote 0
                              • O
                                Okijames last edited by

                                Another burst (47K so far) of attempts today, from both my rooted and unrooted phones. It appears to be the FOSS version of Telegram for Android is the culprit.

                                On my Mac the full desktop Telegram client is less aggressive, in the 100's of attempts per day. The Lite version does not exhibit this behavior.

                                1 Reply Last reply Reply Quote 0
                                • O
                                  Okijames @n3xus_x3 last edited by

                                  @n3xus_x3 I opened an issue on github. Please chime in... https://github.com/Telegram-FOSS-Team/Telegram-FOSS/issues/490

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post

                                  Products

                                  • Platform Overview
                                  • TNSR
                                  • pfSense Plus
                                  • Appliances

                                  Services

                                  • Training
                                  • Professional Services

                                  Support

                                  • Subscription Plans
                                  • Contact Support
                                  • Product Lifecycle
                                  • Documentation

                                  News

                                  • Media Coverage
                                  • Press
                                  • Events

                                  Resources

                                  • Blog
                                  • FAQ
                                  • Find a Partner
                                  • Resource Library
                                  • Security Information

                                  Company

                                  • About Us
                                  • Careers
                                  • Partners
                                  • Contact Us
                                  • Legal
                                  Our Mission

                                  We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                  Subscribe to our Newsletter

                                  Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                  © 2021 Rubicon Communications, LLC | Privacy Policy