Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    Introducing Netgate Nexus: Multi-Instance Management at Your Fingertips.

    Unable to block IP

    Scheduled Pinned Locked Moved Firewalling
    8 Posts 4 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      budsecpro
      last edited by

      Ok this is my first post here so be gentle. :) Im not new to firewalls or network security, but this one is really weird to me.

      I was doing some analysis with Wireshark on one of my systems and noticed a repeated connection to 64.233.171.125. Every 2 to 5 seconds my system sends out an ~84 byte packet to port 5222 (XMPP) with a 60 byte return. So far I have been able to traceroute in about 12 hops. DNS lookups produce no information, though I have only begun to investigate this IP. I have seen mentions of Google datacenters in the 64.233.171.x range, but nothing for this specific IP.

      My problem is that I cannot seem to block this IP AT ALL. I have tried it both as a floating rule and linked to the interface. I have even put a block on the offending workstation. I can block other Internet traffic on the offending system, But this IP will not be blocked. Has anyone else had trouble with blocking specific IPs from the Internet.

      Thanks!

      EDIT: I found the culprit googledrivesync.exe. So now I know what it is but I still cannot block it with pfSense. Still a mystery.

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        No opinion on how effective this will be (If you really want to block this stuff, a much better approach is to pass what you want to let through and block everything else.)

        This floating rule will block it.

        Note that if this is a persistent connection it will only block subsequent connections.  You ought to be able to view states, filter on 64.233.171.125, then just clear those to cause immediate effect.

        If you know which LAN interface this traffic is originating on, you could also block it there.  Reject IPv4 TCP/UDP Source LAN net dest 64.233.171.125 dest port 5222.

        ETA: Checked the Apply immediately on match checkbox.  You want that on for this…

        ![Screen Shot 2014-11-29 at 11.32.55 AM.png_thumb](/public/imported_attachments/1/Screen Shot 2014-11-29 at 11.32.55 AM.png_thumb)
        ![Screen Shot 2014-11-29 at 11.32.55 AM.png](/public/imported_attachments/1/Screen Shot 2014-11-29 at 11.32.55 AM.png)

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • B Offline
          budsecpro
          last edited by

          Yeah, whitelisting is definitely more secure than blacklisting, but its a bear to maintain.

          I did try to generate new communications using ping with the "any" protocol and "any" port options set. Still got my pings through.

          1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            You're going to have to post some screenshots then because things are not how they seem.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • C Offline
              cmb
              last edited by

              Delete states for that IP after you add the block rule if you want to kill already-established sessions.

              1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator
                last edited by

                I would look to the workstation vs just blocking it, a google for 5222 comes up with google talk..

                I fired up a a old copy and sure enough

                64.233.182.125.5222

                You sure the IP is not changing on you for a reason you can not block it?  The ttl on talk.l.google.com is like 300 seconds, so that IP could change all the time.  Is your issue that there is traffic at all, or that its every few seconds.. If somone is chatting then I would think there would be lots of traffic ;)  Why don't you just go to the machine that is generating the traffic ande look to see what is creating it?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.11.1 | Lab VMs 2.8.1, 25.11.1

                1 Reply Last reply Reply Quote 0
                • DerelictD Offline
                  Derelict LAYER 8 Netgate
                  last edited by

                  @budsecpro:

                  Yeah, whitelisting is definitely more secure than blacklisting, but its a bear to maintain.

                  I would argue that the thing that is a bear to maintain are reliable lists of things like google's IP addresses.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • B Offline
                    budsecpro
                    last edited by

                    @johnpoz:

                    I would look to the workstation vs just blocking it, a google for 5222 comes up with google talk..

                    I fired up a a old copy and sure enough

                    64.233.182.125.5222

                    You sure the IP is not changing on you for a reason you can not block it?  The ttl on talk.l.google.com is like 300 seconds, so that IP could change all the time.  Is your issue that there is traffic at all, or that its every few seconds.. If somone is chatting then I would think there would be lots of traffic ;)  Why don't you just go to the machine that is generating the traffic ande look to see what is creating it?

                    I tracked it down to the google drive sync tool. My issue was that I didnt know what it was and it appeared to be either a beacon or an exfiltration attempt. As it turned out it was a stuck app. Netstat gave me the suspect executable and once I restarted googledrivesync.exe the suspect traffic stopped as well.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.