Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    Introducing Netgate Nexus: Multi-Instance Management at Your Fingertips.

    Is this a Attack ?

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 5 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      Jamerson
      last edited by

      Dear All,
      lately i've seen alot of logs on the firewall from this ip 218.77.79.43
      block

      Jan 18 01:29:40	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 218.77.79.43:57651	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:80	TCP:S
      

      and

      block
      Jan 18 01:45:56	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:46:20	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:46:49	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:47:54	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:47:58	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 192.168.2.254	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 224.0.0.1	IGMP
       block
      Jan 18 01:48:23	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:48:23	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:48:26	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:48:33	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:48:45	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:49:10	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
       block
      Jan 18 01:49:39	WAN	 Icon Reverse Resolve with DNS  Icon Easy Rule: Add to Block List 76.187.41.69:30792	 Icon Reverse Resolve with DNS  Icon Easy Rule: Pass this traffic 10.10.10.1:6045	UDP
      

      any suggestions if this a kind of attack or not ?

      1 Reply Last reply Reply Quote 0
      • BBcan177B Offline
        BBcan177 Moderator
        last edited by

        https://www.google.ca/search?q=who+is+218.77.79.43&hl=en-US&gws_rd=cr,ssl&ei=Bgu7VJ6jOIWryATfg4KICA

        It's an IP from China.
        If you have any open Wan ports you should enter it in a firewall blocklist.

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • johnpozJ Online
          johnpoz LAYER 8 Global Moderator
          last edited by

          Attack??  Its a few packets of udp noise..  Why your seeing it to rfc1918 address seems a bit strange.. Are you behind a double nat?

          That is your typical noise, sure and the hell is not an attack..  Its already blocked - what are you worried about?  Do you not want it logged?  The internet is a wild wild west of packets, you will see all kinds of shit ;)

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.11.1 | Lab VMs 2.8.1, 25.11.1

          1 Reply Last reply Reply Quote 0
          • J Offline
            Jamerson
            last edited by

            @johnpoz:

            Attack??  Its a few packets of udp noise..  Why your seeing it to rfc1918 address seems a bit strange.. Are you behind a double nat?

            That is your typical noise, sure and the hell is not an attack..  Its already blocked - what are you worried about?  Do you not want it logged?  The internet is a wild wild west of packets, you will see all kinds of shit ;)

            thank you for your answer :) and about the kind of shit stuff  ;)

            yes i am behind double nat ,
            ISP Modem >>>Pfsense>>>>Machines
            i was worried but with your answer i am not anymore.
            because i've seen on the internet the IP i mentioned was attacking alot sources on the internet.
            because i am behind double nat its a normal behaivor that it logged on the RFC1918 ?

            1 Reply Last reply Reply Quote 0
            • K Offline
              kejianshi
              last edited by

              Really, you don't need to worry to much about people banging at the doors as long as your pfsense is set up either plain default which is secure or otherwise configured properly.

              I'd not ever get worried unless I say alot of unexplained outbound bandwidth being used.

              I know people are just forever chewing on my vpn servers, presumably trying to get in.

              As long as they are not having any success, I don't worry over it.  Its bound to happen that people try.  They are bored apparently.

              1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator
                last edited by

                The udp stuff is quite often just torrent noise, your ip was in a swarm maybe - etc..  I sometimes just setup a rule for udp so its not logged.

                Here some hits to telnet..  So what its not open, firewall dropped it as it should..  Your going to see that all day long, all the time.. Unless its 1,000 or hundreds of thousands of packets a second who cares ;)

                tcpnoise.png
                tcpnoise.png_thumb

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.11.1 | Lab VMs 2.8.1, 25.11.1

                1 Reply Last reply Reply Quote 0
                • J Offline
                  Jamerson
                  last edited by

                  @kejianshi:

                  Really, you don't need to worry to much about people banging at the doors as long as your pfsense is set up either plain default which is secure or otherwise configured properly.

                  I'd not ever get worried unless I say alot of unexplained outbound bandwidth being used.

                  I know people are just forever chewing on my vpn servers, presumably trying to get in.

                  As long as they are not having any success, I don't worry over it.  Its bound to happen that people try.  They are bored apparently.

                  Thank you so much for your answer, i am trying to understand when they are succeced / if they are succeced.
                  the only behaivor i am gonna notice is a lot outbound bandwidth will be used.
                  i'll monitor that from time to time.

                  1 Reply Last reply Reply Quote 0
                  • J Offline
                    Jamerson
                    last edited by

                    @Jamerson:

                    @kejianshi:

                    Really, you don't need to worry to much about people banging at the doors as long as your pfsense is set up either plain default which is secure or otherwise configured properly.

                    I'd not ever get worried unless I say alot of unexplained outbound bandwidth being used.

                    I know people are just forever chewing on my vpn servers, presumably trying to get in.

                    As long as they are not having any success, I don't worry over it.  Its bound to happen that people try.  They are bored apparently.

                    Thank you so much for your answer, i am trying to understand when they are succeced / if they are succeced.
                    the only behaivor i am gonna notice is a lot outbound bandwidth will be used.
                    i'll monitor that from time to time.

                    @johnpoz:

                    The udp stuff is quite often just torrent noise, your ip was in a swarm maybe - etc..  I sometimes just setup a rule for udp so its not logged.

                    Here some hits to telnet..  So what its not open, firewall dropped it as it should..  Your going to see that all day long, all the time.. Unless its 1,000 or hundreds of thousands of packets a second who cares ;)

                    thank you for your explain as always !
                    appreciate you guys !

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Online
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      " i am trying to understand when they are succeced / if they are succeced."

                      Are you logging passed traffic?  Your not going to see anything in the logs if they get in ;)  But default rule is BLOCK.. So unless you forwarded traffic - where are they going?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.11.1 | Lab VMs 2.8.1, 25.11.1

                      1 Reply Last reply Reply Quote 0
                      • J Offline
                        Jamerson
                        last edited by

                        @johnpoz:

                        " i am trying to understand when they are succeced / if they are succeced."

                        Are you logging passed traffic?  Your not going to see anything in the logs if they get in ;)  But default rule is BLOCK.. So unless you forwarded traffic - where are they going?

                        yes i am logging the pass traffic,
                        i mean the pfsense has been hacked, is there is some behaivor i am supposed to notice ?

                        1 Reply Last reply Reply Quote 0
                        • H Offline
                          Harvy66
                          last edited by

                          I receive about 19 packets per second 24/7 of blocked traffic on my residential line. You're getting one every tens of seconds. You're very unlikely to get hacked if you block WAN traffic to your web interface. The administrative web server is the biggest liability by far.

                          The firewall itself is quite hardended. Anyone with the ability to "hack" the FreeBSD firewall will have much bigger targets to use their 0-day exploit on.

                          1 Reply Last reply Reply Quote 0
                          • J Offline
                            Jamerson
                            last edited by

                            @Harvy66:

                            I receive about 19 packets per second 24/7 of blocked traffic on my residential line. You're getting one every tens of seconds. You're very unlikely to get hacked if you block WAN traffic to your web interface. The administrative web server is the biggest liability by far.

                            The firewall itself is quite hardended. Anyone with the ability to "hack" the FreeBSD firewall will have much bigger targets to use their 0-day exploit on.

                            my pfsense is not accessible over the WAN at all,
                            the only port is facing the WAN is the Openvpn port, others are drop/reject

                            thank you

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.