This is infuriating that I continue to get this repeats of nine and more possible hack attempts from the same certain IP addresses blocked by Malwarebytes, which I get popups every time it happens. This is a snapshot from my logs after one has happened, and I also save text file logs of it.

From what I can tell, they appeared to be originating from Linode almost every time and when I tried to file complaints with them, they keep claiming it is a security researcher or something and end up doing nothing about it. I’m currently wondering what to do about this as I have a folder of so many save logs of it on my computer.

  • Skull giver@popplesburger.hilciferous.nl
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    Looks like it’s just a port scanner. If you’re going to report every port scanner or exploit bot, you’re going to have a full time job as a voluntary internet policeman.

    I’d just ignore it if I were you, these things happen. My servers gets hundreds, or sometimes even thousand of these a day.

    If it pops up in Malwarebytes that means you’ve either opened the port or disabled your router’s firewall somehow. If this was intentional: welcome to the internet. If it wasn’t, check your firewall settings, because there are much worse things than automatic exploit scanners.

    You can try to fight back (you could tarpit the scanners, or use a gzip bomb to maybe crash their scanner) but it’s probably not worth the effort.

  • MangoPenguin@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    It’s normal to get scans/attempts on any public IP.

    That said, malwarebytes is usually run on personal computers, do you have ports forwarded to your PC from the internet?

      • i2ndshenanigans@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 months ago

        If they are making it past your firewall and hitting your computer then the firewall is open and it shouldn’t be. Or that’s an outbound connection triggering the alert.

        • Kid_Thunder@kbin.social
          link
          fedilink
          arrow-up
          0
          ·
          10 months ago

          Just clarification here, a NAT is NOT a firewall. It will drop packets originating from outside the network if the ports aren’t forwarded to an IP simply because the NAT has no idea which device on the network to send the packets to. A forwarded port is you telling the NAT to assume packets coming into a specific port should be forwarded to a specific device. It is acting as a security measure simply by coincidence but not by design. Unlike a firewall it will not inspect any packet payload or attempt to make a security decision on outbound packets. It only routes based on the packet headers.

          A firewall on the other hand actively will reject or drop packets because it is an Intrusion Prevention System (IPS). This is why if your router has a built-in firewall, your NAT will still drop the packets – because it isn’t a firewall nor is it what is being referred to if you disable it.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    If you don’t have any of those ports open, then just ignore it. There are lots of bots out there that are just scanning for easy targets.