Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    I have been seeing TOR on IPS again

    Scheduled Pinned Locked Moved IDS/IPS
    7 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee
      last edited by

      Has anyone else noticed the increase of your IPS blocking out TOR attempting to use proxy chains on your systems?

      I have been seeing this address being the invasive actor

      192.42.116.214

      Again if IPS sees it as a TOR exit node it is bouncing off of this address from somewhere else.

      04/17/24-14:25:28.464596 ,1,2522061,5497,"ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 62",TCP,192.42.116.214,20003,REDACTED,41,0,Misc Attack,2,alert,Allow

      04/17/24-14:25:28.464596 ,1,2520061,5497,"ET TOR Known Tor Exit Node TCP Traffic group 62",TCP,192.42.116.214,20003,REDACTED,41,0,M

      Last time I saw this activity there was major issues with attacks, anyone else see this going on again? Thank you Snort for blocking it!!!

      Make sure to upvote

      S johnpozJ 2 Replies Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @JonathanLee
        last edited by

        @JonathanLee We block TOR using pfBlocker feeds so don't see it in Suricata logs. To be honest though I'd expect a constant stream of probes and scans 24x7.

        https://betanews.com/2024/04/16/bots-account-for-half-of-all-web-traffic/

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @JonathanLee
          last edited by johnpoz

          @JonathanLee well there is this going on right now, which could account for seeing more hits from tor exit nodes

          https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/

          These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies.

          I am with @SteveITS on this - why would you ever allow a TOR exit node to even see your ports that are open, let alone talk to them... I have zero use for anyone using any such services to talk to any of my services I expose to the public.

          Its quite easy to create lists that would contain the vast majority of such IPs, and just drop them before they even get to your open ports.. This is much easier solution than running an IDS/IPS if you ask me.

          edit: I just added the list of IPs they list in the above article to my scan deny list.

          Updating: pfB_ScanDeny_v4
          3786 addresses added.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          JonathanLeeJ 2 Replies Last reply Reply Quote 1
          • JonathanLeeJ
            JonathanLee @johnpoz
            last edited by

            @johnpoz I have some information from various sources that police dispatch systems are down as well as ransomware that is spreading inside remote systems, the timelines and what you just sent and what the IPS systems are seeing are pointing to TOR being used and detected. I think it's a nation state actor. Thanks for the info John. I wonder how they will fix this I assume not everyone uses IPS/IDS systems.

            Make sure to upvote

            1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @johnpoz
              last edited by

              @johnpoz I added that IP to the list it was missing that address for some reason it skipped that one weird, it went from the IP before and after it but not that IP address

              Make sure to upvote

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @JonathanLee
                last edited by

                @JonathanLee said in I have been seeing TOR on IPS again:

                that IP to the list it was missing that address for some reason it skipped that one weird

                That IP you listed is a tor exit node

                "192.42.116.214",
                hostname:"17.tor-exit.nothingtohide.nl",

                It would never be able to talk to any of my ports anyway - because its not US based IP. I only allow specific IPs and US based IPs to even talk to any of my services I expose.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                JonathanLeeJ 1 Reply Last reply Reply Quote 1
                • JonathanLeeJ
                  JonathanLee @johnpoz
                  last edited by

                  @johnpoz yes it is, however it was not in the Talos Cisco IP list yet. I submitted a request to add that specific IP. That link you sent me has a IP list with a lot of them except it was missing that one address.

                  Make sure to upvote

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.