Originally posted by: spidey07
THX,
You'll have to forgive NocMonkey...he doesn't talk to real people much. He prefers the company of unix boxes. 😉
About your alerts, don't worry about it. You'll get attempts to your IP address all the time. Nothing to worry about unless there's a big amount (1 packet per second). Just part of the internet background noise so to speak.
Originally posted by: THX1139
Doh, I knew I was forgetting something. All three were TCP.
Originally posted by: THX1139
Well, I do not think the first, or any, alert was truly from the mysql on my computer, because it is setup in ZApro to be allowed full permission, traffic-wise. But, I suspected the 3727 port being one that mysql used in which an outside entity was sniffing for mysql ports. Just a hunch, and not a very good one at that. Hold on ...
Well, dang. I just realized this forum doesn't support image loading. Ok, in ZApro Alerts & Logs the line entry reads from left to right as follows:
Rating, Date & Time, Type, Protocol, Program, Source-IP, Destination-IP, Direction, Action Taken
===================================================================
High, 2002/11/05 10:58:34-5:00, Firewall, TCP(flag:S), 210.241.27.194:3727, 192.168.xxx.yyy:21, Incoming, Blocked
Alright smarty pants...just what OS uses this range for source ports?Port 3727 is a typical source port for a non-rooot/admin user.
Originally posted by: spidey07
Alright smarty pants...just what OS uses this range for source ports?Port 3727 is a typical source port for a non-rooot/admin user.
Originally posted by: spidey07
Noc,
I don't know that stuff off the top of my head. 🙁 I see so many traces week to week that it all sort of blends together. But I do believe that certain OSs have certain source port ranges (one of the criteria that nmap uses to determine OS). I'm sure there are web links out there.