javadezati
January 15th, 2019, 10:45
سلام
دوستان روی سرور آلمان ...هتزنر...روتر نصب داریم و پورتها رو بستیم
اما امروز ابیوز نت اسکن اومد روی پورتهای 445 و 1433 و ما این دو پورت رو روی tcp و udp بستیم...هم ورودی و هم خروجی
کسی میتونه راهنمایی کنه که چطوری این سرور مجازی روی پورتهایی که بستیم ابیوز نت اسکن گرفته
باتشکر
---------------
We have indications that there was an attack from your server.
Please take all necessary measures to avoid this in the future and to solve the issue.
We also request that you send a short response to us. This response should contain information about how this could have happened and what you intend to do about it.
In the event that the following steps are not completed successfully, your server can be blocked at any time after the 2019-01-15 12:17:12 +0100.
How to proceed:
- Solve the issue
- Test if the issue still exists by using the following link:
- After successfully testing that the issue is resolved, send us a statement by using the following link:
Important note:
When replying to us, please leave the abuse ID [AbuseID:++++] unchanged in the subject line. Manual replies will only be handled in the event of a lock down. Should you have any questions relating to this, please contact our support staff at support@hetzner.com.
Please note that we do not provide telephone support in our department.
If you have any questions, please send them to us by responding to this email.
Kind regards
Network department
Hetzner Online GmbH
Industriestr. 25
91710 Gunzenhausen / Germany
Tel: +49 9831 505-0
Fax: +49 9831 505-3
abuse@hetzner.com
www.hetzner.com (http://www.hetzner.com)
Register Court: Registergericht Ansbach, HRB 6089
CEO: Martin Hetzner
On 15 Jan 04:16, root@monitoring2.rz1.hetzner.de wrote:
> ################################################## ########################
> # Netscan detected from host 148.************** #
> ################################################## ########################
>
> time protocol src_ip src_port dest_ip dest_port
> ---------------------------------------------------------------------------
Tue Jan 15 04:16:06 2019 TCP 148.******** 48943 => 13.2.141.81 445
Tue Jan 15 04:16:06 2019 TCP 148.********* 48943 => 13.2.141.81 1433
دوستان روی سرور آلمان ...هتزنر...روتر نصب داریم و پورتها رو بستیم
اما امروز ابیوز نت اسکن اومد روی پورتهای 445 و 1433 و ما این دو پورت رو روی tcp و udp بستیم...هم ورودی و هم خروجی
کسی میتونه راهنمایی کنه که چطوری این سرور مجازی روی پورتهایی که بستیم ابیوز نت اسکن گرفته
باتشکر
---------------
We have indications that there was an attack from your server.
Please take all necessary measures to avoid this in the future and to solve the issue.
We also request that you send a short response to us. This response should contain information about how this could have happened and what you intend to do about it.
In the event that the following steps are not completed successfully, your server can be blocked at any time after the 2019-01-15 12:17:12 +0100.
How to proceed:
- Solve the issue
- Test if the issue still exists by using the following link:
- After successfully testing that the issue is resolved, send us a statement by using the following link:
Important note:
When replying to us, please leave the abuse ID [AbuseID:++++] unchanged in the subject line. Manual replies will only be handled in the event of a lock down. Should you have any questions relating to this, please contact our support staff at support@hetzner.com.
Please note that we do not provide telephone support in our department.
If you have any questions, please send them to us by responding to this email.
Kind regards
Network department
Hetzner Online GmbH
Industriestr. 25
91710 Gunzenhausen / Germany
Tel: +49 9831 505-0
Fax: +49 9831 505-3
abuse@hetzner.com
www.hetzner.com (http://www.hetzner.com)
Register Court: Registergericht Ansbach, HRB 6089
CEO: Martin Hetzner
On 15 Jan 04:16, root@monitoring2.rz1.hetzner.de wrote:
> ################################################## ########################
> # Netscan detected from host 148.************** #
> ################################################## ########################
>
> time protocol src_ip src_port dest_ip dest_port
> ---------------------------------------------------------------------------
Tue Jan 15 04:16:06 2019 TCP 148.******** 48943 => 13.2.141.81 445
Tue Jan 15 04:16:06 2019 TCP 148.********* 48943 => 13.2.141.81 1433