LINUX.ORG.RU

tcp syn flood, ports 41190 и 58960

 


0

2

Что это такое может быть? Это в современном мире нормально или не очень? Это адрес, полученный от провайдера, ранее использовался в торрентах, freenet и т.п.?

PS: на самом деле портов сильно больше, все какие-то рандомные и постоянный заметный траффик.

  17:30:50.638250 IP 235.pppoe-186.ip2.mkpnet.ru.50148 > 192.168.0.100.58960: Flags [S], seq 3477261718, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
  17:30:50.823024 IP client.yota.ru.56053 > 192.168.0.100.58960: Flags [S], seq 2447152188, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:30:50.865853 IP 185.93.184.74.5139 > 192.168.0.100.41190: Flags [S], seq 3295782166, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:52.259038 IP 93-170-246-81.proximanet.ru.49669 > 192.168.0.100.41190: Flags [S], seq 269793273, win 8192, options [mss 1344,nop,nop,sackOK], length 0
17:30:52.306235 IP 175.13.165.46.access-pools.setitagila.ru.55201 > 192.168.0.100.58960: Flags [S], seq 809439801, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:53.377613 IP 5.136.203.96.60006 > 192.168.0.100.41190: Flags [S], seq 1196855321, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:53.617367 IP 248.42.pppoe.mari-el.ru.62956 > 192.168.0.100.41190: Flags [S], seq 3596882185, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:53.636887 IP 235.pppoe-186.ip2.mkpnet.ru.50148 > 192.168.0.100.58960: Flags [S], seq 3477261718, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:53.859836 IP client.yota.ru.56053 > 192.168.0.100.58960: Flags [S], seq 2447152188, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:30:54.651214 IP 5.178.140.236.62704 > 192.168.0.100.58960: Flags [S], seq 3602423510, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:55.935584 IP 46.70.129.135.58791 > 192.168.0.100.41190: Flags [S], seq 541400083, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:56.373043 IP 5.136.203.96.60006 > 192.168.0.100.41190: Flags [S], seq 1196855321, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:57.391304 IP 176.50.247-185.xdsl.ab.ru.51819 > 192.168.0.100.41190: Flags [S], seq 3078581212, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:58.975095 IP 46.70.129.135.58791 > 192.168.0.100.41190: Flags [S], seq 541400083, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:30:59.176585 IP 82.200.40.26.32775 > 192.168.0.100.41190: Flags [S], seq 4201764902, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:59.638755 IP 235.pppoe-186.ip2.mkpnet.ru.50148 > 192.168.0.100.58960: Flags [S], seq 3477261718, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:30:59.813170 IP client.yota.ru.56053 > 192.168.0.100.58960: Flags [S], seq 2447152188, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:00.398935 IP 176.50.247-185.xdsl.ab.ru.51819 > 192.168.0.100.41190: Flags [S], seq 3078581212, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:01.366330 IP 208.mtsnet.ru.23207 > 192.168.0.100.58960: Flags [S], seq 3835826971, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:01.625765 IP ws.92.127.218.6.nsk.sibirtelecom.ru.58413 > 192.168.0.100.41190: Flags [S], seq 1671764912, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:02.175228 IP 82.200.40.26.32775 > 192.168.0.100.41190: Flags [S], seq 4201764902, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:02.380540 IP 5.136.203.96.60006 > 192.168.0.100.41190: Flags [S], seq 1196855321, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:03.388529 IP nat-minsk-pool-46-53-202-212.telecom.by.59348 > 192.168.0.100.41190: Flags [S], seq 3431318868, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:04.380640 IP ip-040-116-064-178.pools.atnet.ru.60103 > 192.168.0.100.41190: Flags [S], seq 2993284730, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:04.621829 IP ws.92.127.218.6.nsk.sibirtelecom.ru.58413 > 192.168.0.100.41190: Flags [S], seq 1671764912, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:04.913124 IP 46.70.129.135.58791 > 192.168.0.100.41190: Flags [S], seq 541400083, win 65535, options [mss 1360,nop,nop,sackOK], length 0
17:31:05.570911 IP 88-201-148-196.cable.pakt.spb.ru.1946 > 192.168.0.100.41190: Flags [S], seq 2668498572, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:06.160972 IP pool-46-63-65-11.x-city.ua.50702 > 192.168.0.100.41190: Flags [S], seq 824301628, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:06.389008 IP nat-minsk-pool-46-53-202-212.telecom.by.59348 > 192.168.0.100.41190: Flags [S], seq 3431318868, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:06.406106 IP 176.50.247-185.xdsl.ab.ru.51819 > 192.168.0.100.41190: Flags [S], seq 3078581212, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:07.365229 IP 208.mtsnet.ru.23207 > 192.168.0.100.58960: Flags [S], seq 3835826971, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:07.790245 IP 89.237.37.137.62335 > 192.168.0.100.58960: Flags [S], seq 3434566909, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:08.176383 IP 82.200.40.26.32775 > 192.168.0.100.41190: Flags [S], seq 4201764902, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:08.625170 IP 88-201-148-196.cable.pakt.spb.ru.1946 > 192.168.0.100.41190: Flags [S], seq 2668498572, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:09.161287 IP pool-46-63-65-11.x-city.ua.50702 > 192.168.0.100.41190: Flags [S], seq 824301628, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:10.632056 IP ws.92.127.218.6.nsk.sibirtelecom.ru.58413 > 192.168.0.100.41190: Flags [S], seq 1671764912, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:10.790794 IP 89.237.37.137.62335 > 192.168.0.100.58960: Flags [S], seq 3434566909, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:11.249880 IP 212-112-119-186.aknet.kg.49977 > 192.168.0.100.41190: Flags [S], seq 3461709285, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:12.389286 IP nat-minsk-pool-46-53-202-212.telecom.by.59348 > 192.168.0.100.41190: Flags [S], seq 3431318868, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:12.710042 IP vpn.imperial.net.ua.58571 > 192.168.0.100.58960: Flags [S], seq 638274751, win 8192, options [mss 1340,nop,wscale 2,nop,nop,sackOK], length 0
17:31:14.255023 IP 212-112-119-186.aknet.kg.49977 > 192.168.0.100.41190: Flags [S], seq 3461709285, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:14.627565 IP 88-201-148-196.cable.pakt.spb.ru.1946 > 192.168.0.100.41190: Flags [S], seq 2668498572, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:14.731959 IP ip-130-193-124-135.gnc.net.50485 > 192.168.0.100.41190: Flags [S], seq 2570671245, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:15.156209 IP pool-46-63-65-11.x-city.ua.50702 > 192.168.0.100.41190: Flags [S], seq 824301628, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:15.710908 IP vpn.imperial.net.ua.58571 > 192.168.0.100.58960: Flags [S], seq 638274751, win 8192, options [mss 1340,nop,wscale 2,nop,nop,sackOK], length 0
17:31:16.019822 IP 164.227.212.178.convex-tagil.ru.53926 > 192.168.0.100.41190: Flags [S], seq 1982156980, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:16.792515 IP 89.237.37.137.62335 > 192.168.0.100.58960: Flags [S], seq 3434566909, win 8192, options [mss 1360,nop,nop,sackOK], length 0
17:31:17.727209 IP ip-130-193-124-135.gnc.net.50485 > 192.168.0.100.41190: Flags [S], seq 2570671245, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:19.018370 IP 164.227.212.178.convex-tagil.ru.53926 > 192.168.0.100.41190: Flags [S], seq 1982156980, win 8192, options [mss 1360,nop,wscale 8,nop,nop,sackOK], length 0
17:31:19.635921 IP 95.56.91.79.megaline.telecom.kz.21434 > 192.168.0.100.41190: Flags [S], seq 3654234156, win 8192, options [mss 1360,nop,wscale 2,nop,nop,sackOK], length 0
17:31:20.250577 IP 212-112-119-186.aknet.kg.49977 > 192.168.0.100.41190: Flags [S], seq 3461709285, win 8192, options [mss 1360,nop,nop,sackOK], length 0


Там действительно 192.168.0.100, или вы свой белый ip-адрес замаскировали?

И как давно этот адрес выдали вам? ИМХО, это больше похоже не на torrent, а на какой-то сервер (допустим игровой), который ещё остался в DNS (в кеше DNS).

mky ★★★★★ ()
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.