Originally posted by: spidey07
THX,
You'll have to forgive NocMonkey...he doesn't talk to real people much. He prefers the company of unix boxes.
About your alerts, don't worry about it. You'll get attempts to your IP address all the time. Nothing to worry about unless there's a big amount (1 packet per second). Just part of the internet background noise so to speak.
Originally posted by: THX1139
Doh, I knew I was forgetting something. All three were TCP.
Originally posted by: THX1139
Well, I do not think the first, or any, alert was truly from the mysql on my computer, because it is setup in ZApro to be allowed full permission, traffic-wise. But, I suspected the 3727 port being one that mysql used in which an outside entity was sniffing for mysql ports. Just a hunch, and not a very good one at that. Hold on ...
Well, dang. I just realized this forum doesn't support image loading. Ok, in ZApro Alerts & Logs the line entry reads from left to right as follows:
Rating, Date & Time, Type, Protocol, Program, Source-IP, Destination-IP, Direction, Action Taken
===================================================================
High, 2002/11/05 10:58:34-5:00, Firewall, TCP(flag:S), 210.241.27.194:3727, 192.168.xxx.yyy:21, Incoming, Blocked
Alright smarty pants...just what OS uses this range for source ports?Port 3727 is a typical source port for a non-rooot/admin user.
Originally posted by: spidey07
Alright smarty pants...just what OS uses this range for source ports?Port 3727 is a typical source port for a non-rooot/admin user.
Originally posted by: spidey07
Noc,
I don't know that stuff off the top of my head.I see so many traces week to week that it all sort of blends together. But I do believe that certain OSs have certain source port ranges (one of the criteria that nmap uses to determine OS). I'm sure there are web links out there.