Find domain connection blocked by firewall
Posted: 14 Apr 2018, 16:04
Hello. A few days ago the main IP of our server was listed by Spamhause. The reason was:
This was detected by a TCP connection from "31.200.243.xxx" on
port "48048" going to IP address "192.42.119.41" (the sinkhole
(sinkhole.html)) on port "80".
The botnet command and control domain for this connection
was "04d92810.com".
This detection corresponds to a connection at Fri Apr 13 05:15:21
2018 UTC (this timestamp is believed accurate to within one
second).
Detection Information Summary
Destination IP 192.42.119.41
Destination port 80
Source IP 31.200.243.xxx
Source port 48048
C&C name/domain 04d92810.com
Protocol TCP
Time Fri Apr 13 05:15:21 2018 UTC
The IP listed 2 times, and each time we delist manually, but Spamhaus continue saying that connections remain.
What we did is deny the IP 192.42.119.41 in CSF. Now Spamhaus are not detecting the connection, but connection continues from our server. This is messages log obtained from CSF:
Apr 14 16:29:05 virt1947 kernel: [878598.655718] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=2289 DF PROTO=TCP SPT=46930 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:05 virt1947 kernel: [878598.656034] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxxDST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59481 DF PROTO=TCP SPT=46932 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:06 virt1947 kernel: [878599.656123] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59482 DF PROTO=TCP SPT=46932 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:06 virt1947 kernel: [878599.656269] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12270 DF PROTO=TCP SPT=46934 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:07 virt1947 kernel: [878600.656307] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12271 DF PROTO=TCP SPT=46934 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:08 virt1947 kernel: [878601.655235] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=57884 DF PROTO=TCP SPT=46938 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
How can we discover from what domain are making these connections?.
Thanks.
Kind regards.
This was detected by a TCP connection from "31.200.243.xxx" on
port "48048" going to IP address "192.42.119.41" (the sinkhole
(sinkhole.html)) on port "80".
The botnet command and control domain for this connection
was "04d92810.com".
This detection corresponds to a connection at Fri Apr 13 05:15:21
2018 UTC (this timestamp is believed accurate to within one
second).
Detection Information Summary
Destination IP 192.42.119.41
Destination port 80
Source IP 31.200.243.xxx
Source port 48048
C&C name/domain 04d92810.com
Protocol TCP
Time Fri Apr 13 05:15:21 2018 UTC
The IP listed 2 times, and each time we delist manually, but Spamhaus continue saying that connections remain.
What we did is deny the IP 192.42.119.41 in CSF. Now Spamhaus are not detecting the connection, but connection continues from our server. This is messages log obtained from CSF:
Apr 14 16:29:05 virt1947 kernel: [878598.655718] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=2289 DF PROTO=TCP SPT=46930 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:05 virt1947 kernel: [878598.656034] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxxDST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59481 DF PROTO=TCP SPT=46932 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:06 virt1947 kernel: [878599.656123] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59482 DF PROTO=TCP SPT=46932 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:06 virt1947 kernel: [878599.656269] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12270 DF PROTO=TCP SPT=46934 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:07 virt1947 kernel: [878600.656307] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12271 DF PROTO=TCP SPT=46934 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
Apr 14 16:29:08 virt1947 kernel: [878601.655235] Firewall: *TCP_OUT Blocked* IN= OUT=venet0 SRC=31.200.243.xxx DST=192.42.119.41 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=57884 DF PROTO=TCP SPT=46938 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0 UID=545 GID=545
How can we discover from what domain are making these connections?.
Thanks.
Kind regards.