fencepost
Well-Known Member
- Reaction score
- 2,314
- Location
- Schaumburg, IL
Would providing them a copy of that log be adequate?
Would providing them a copy of that log be adequate?
I'm recovering from tendon surgery and can only work with one arm
Most likely. A whois of the IP points to Aperia SolutionsThere was only one series of traffic from a single address in the log, Do you think that was the scan? Here is an edited snap:
View attachment 9001
Most likely. A whois of the IP points to Aperia Solutions
This is a SYN packet - the first step in a TCP handshake. With a successful connection process, the receipt of the SYN packet should be followed by a SYN-ACK packet being returned, and then finally, by an ACK packet being received in response. IN my case, there is no SYN-ACK packet. Instead, 29 seconds later, I see a log entry outbound from me to them. The details of this entry are:
At this point I think it's time to self-attest there is no risk If you really want to spend more time on this you could pull the terminal, drop in a regular computer configured with the IP info and then run the scan. Make sure the machine firewall is off. You can also just put the terminal and a computer on a standalone switch, same IP scope and then see if it pings.
If they're going to harden it like that, why TF would they care about security on the internal network?
Well yes, exactly. But they *do* care, apparently. In my mind, the failure to connect should be an automatic pass, not an automatic fail...but I digress.