Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 22 May 2004 20:09:24 +0200
From:      Florian Weimer <fw@deneb.enyo.de>
To:        fbsd_user@a1poweruser.com
Cc:        "freebsd-isp@FreeBSD. ORG" <freebsd-isp@FreeBSD.ORG>
Subject:   Re: Abuse reporting based on whois
Message-ID:  <87r7tctju3.fsf@deneb.enyo.de>
In-Reply-To: <MIEPLLIBMLEEABPDBIEGIEDMFPAA.fbsd_user@a1poweruser.com> (fbsd user's message of "Sat, 22 May 2004 11:39:00 -0400")
References:  <MIEPLLIBMLEEABPDBIEGIEDMFPAA.fbsd_user@a1poweruser.com>

next in thread | previous in thread | raw e-mail | index | archive | help
* fbsd user:

> My ipfilter firewall is blocking  35 to 150 un-solicited inbound
> port packets per minute coming from all over the world. I have an
> dynamic IP address assigned by my ISP, so I know the senders are
> scanning an whole subnet range of IP address for the ports they are
> interested in.  I have to pay for this background packet noise in
> bandwidth usage surcharges.  I decided to research and try to build
> an process to report this abuse to the ISP's who own the source IP
> address that is scanning the whole subnet ranges of IP address I
> belong to.

A significant part of those scans have spoofed source addresses.
Unless you complete a three-way handshake (for TCP scans only, of
course) and thus validate the source address, your observations are
probably not worth reporting.

-- 
Current mail filters: many dial-up/DSL/cable modem hosts, and the
following domains: bigpond.com, di-ve.com, hotmail.com, jumpy.it,
libero.it, netscape.net, postino.it, simplesnet.pt, spymac.com,
tatanova.com, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr, yahoo.com.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87r7tctju3.fsf>