[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?



On Tue, 29 Oct 2024 07:47:53 +0000
mick <mbm@xxxxxxxxxx> allegedly wrote:

> > Same here. Middle relay, automated abuse report forwarded by
> > Hetzner, for alleged scans of TCP port 22 across several related
> > IPv4 class-C networks. I wondered if that was a mistake on the
> > reporting third party's end, but given that I am not the only on,
> > it seems there is more to it.  
> 
> Me too. Middle relay on Hetzner. Alleged SSH scans from my relay. I
> have not yet had time to investigate, but will do so later today.
> 
> Mick

I have taken a look at my relay and noted activity like this a short
while ago.

105.812429380 202.91.162.47 → 95.216.198.252 TCP 54 22 → 18588 [RST,
ACK] Seq=1 Ack=1 Win=5840 Len=0
113.387329574 202.91.163.206 → 95.216.198.252 TCP 54 22 → 41567
[RST, ACK] Seq=1 Ack=1 Win=4128 Len=0

So - resets coming from a host I have not attempted to connect to.

I have informed hetzner and pointed them to the tor-project note at
https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/85
given by Roger Dingledine.

Mick


---------------------------------------------------------------------
 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 blog: baldric.net
---------------------------------------------------------------------

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays