We have someone port scanning our firewall that is using a generic internal address 192.168.0.5.
Any ideas of how to stop him from doing this.
Or ways of tracking him/her.
Is the attack actually coming from your internal network? If so, just track the workstation, and give the user a smack. If its on the external interface, then I really don't think its a big deal, as this is most likely a spoofed address considering that the firewall cannot route to an internal address like that through its external interface.
Some port scanners such as nmap, have a "decoy feature". The port scan will come from one IP address, but it will also send the same scan from a spoofed address. Add 5 or 6 decoys, and it would be hard to tell where the actual scan was coming from.
Look for identical scans from a different IP address, and you may find the offender. ________________________________________
Check out
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.