Unusual System Events =-=-=-=-=-=-=-=-=-=-= Feb 25 11:34:16 greatwall pppd[8480]: pppd 2.4.0 started by root, uid 0 Feb 25 11:34:32 greatwall pppd[8480]: Serial connection established. Feb 25 11:34:32 greatwall pppd[8480]: Using interface ppp0 Feb 25 11:34:32 greatwall pppd[8480]: Connect: ppp0 <--> /dev/modem Feb 25 11:34:34 greatwall pppd[8480]: local IP address 12.82.137.117 Feb 25 11:34:34 greatwall pppd[8480]: remote IP address 165.238.131.88 Feb 25 11:34:34 greatwall pppd[8480]: Script /etc/ppp/ip-up started (pid 8484) Feb 25 11:34:35 greatwall kernel: device ppp0 entered promiscuous mode Feb 25 11:34:52 greatwall pppd[8480]: Script /etc/ppp/ip-up finished (pid 8484), status = 0x0 Feb 25 11:35:18 greatwall kernel: device ppp0 left promiscuous mode
So I've dialed up...
...and here we go!
Feb 25 11:35:43 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:35:43 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=28663 F=0x4000 T=56 (#77) host: 63.215.124.47 - unknown.Level3.net Feb 25 11:35:43 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:35:43 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=28666 F=0x4000 T=56 (#77) Feb 25 11:35:48 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:35:48 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=32358 F=0x4000 T=56 (#77) Feb 25 11:35:50 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:35:50 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=34292 F=0x4000 T=56 (#77) Feb 25 11:35:58 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:35:58 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=40788 F=0x4000 T=56 (#77) Feb 25 11:36:00 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 12.254.23.104:1314 -> 12.82.137.117:6346 Feb 25 11:36:00 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.254.23.104:1314 12.82.137.117:6346 L=48 S=0x00 I=4742 F=0x4000 T=118 SYN (#64) Feb 25 11:36:03 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 12.254.23.104:1314 -> 12.82.137.117:6346 Feb 25 11:36:03 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.254.23.104:1314 12.82.137.117:6346 L=48 S=0x00 I=4754 F=0x4000 T=118 SYN (#64) host: 12.254.23.104 - 12-254-23-104.client.attbi.com Feb 25 11:36:06 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:36:06 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=47317 F=0x4000 T=56 (#77) Feb 25 11:36:09 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 12.254.23.104:1314 -> 12.82.137.117:6346 Feb 25 11:36:09 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.254.23.104:1314 12.82.137.117:6346 L=48 S=0x00 I=4762 F=0x4000 T=118 SYN (#64)
Speaking of Gnutella:
=============================================================================== Snort processed 1435 packets. Breakdown by protocol: Action Stats: TCP: 1435 (100.000%) ALERTS: 0 UDP: 0 (0.000%) LOGGED: 0 ICMP: 0 (0.000%) PASSED: 0 ARP: 0 (0.000%) IPv6: 0 (0.000%) IPX: 0 (0.000%) OTHER: 0 (0.000%) ===============================================================================
1435 packets received in total, in about 4 hours...
Feb 25 11:36:13 greatwall snort: [1:0:0] TCP to 111 sunrpc {TCP} 212.210.177.7:4393 -> 12.82.137.117:111 Feb 25 11:36:13 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 212.210.177.7:4393 12.82.137.117:111 L=60 S=0x00 I=29825 F=0x4000 T=47 SYN (#64) BW whois 2.9 by Bill Weinman (http://whois.bw.org/) © 1999-2001 William E. Weinman % This is the RIPE Whois server. % The objects are in RPSL format. % Please visit http://www.ripe.net/rpsl for more information. % Rights restricted by copyright. % See http://www.ripe.net/ripencc/pub-services/db/copyright.html inetnum: 212.210.177.0 - 212.210.177.255 netname: ITCONSULTING descr: Fabbrica Digitale Srl descr: Internet Service Provider country: IT source: RIPE route: 212.210.0.0/16 descr: INTERBUSINESS origin: AS3269 remarks: Send report of network abuse/spam remarks: only to: abuse@interbusiness.it . remarks: If you report abuse to any other address remarks: you will get no response. notify: network@cgi.interbusiness.it source: RIPE Feb 25 11:36:18 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:36:18 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=56718 F=0x4000 T=56 (#77) Feb 25 11:36:37 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:36:37 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=6606 F=0x4000 T=56 (#77) Feb 25 11:36:58 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:36:58 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=23396 F=0x4000 T=56 (#77) host: 63.215.124.47 - unknown.Level3.net Feb 25 11:37:18 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 216.136.224.213:5050 -> 12.82.137.117:1442 Feb 25 11:37:18 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 216.136.224.213:5050 12.82.137.117:1442 L=40 S=0x00 I=10709 F=0x0000 T=50 (#77) host: 216.136.224.213 - cs21.msg.sc5.yahoo.com Feb 25 11:37:25 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 64.4.12.121:1863 -> 12.82.137.117:1440 Feb 25 11:37:37 greatwall last message repeated 2 times Feb 25 11:37:25 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=20417 F=0x0000 T=242 (#77) Feb 25 11:37:29 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=20418 F=0x0000 T=242 (#77) Feb 25 11:37:37 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=20419 F=0x0000 T=242 (#77) host: 64.4.12.121 - msgr-ns67.msgr.hotmail.com Feb 25 11:37:38 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:37:38 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=52573 F=0x4000 T=56 (#77) Feb 25 11:37:50 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.162.180.161:2638 -> 12.82.137.117:6346 Feb 25 11:37:50 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.162.180.161:2638 12.82.137.117:6346 L=48 S=0x00 I=43224 F=0x4000 T=115 SYN (#64) Sprint (NETBLK-SPRINTLINK-2-BLKS) SPRINTLINK-2-BLKS65.160.0.0 - 65.174.255.255 SMARTCOM TELEPHONE, LLC (NETBLK-FON-110118195273245) FON-110118195273245 65.162.180.0 - 65.162.181.255 Feb 25 11:37:52 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 64.4.12.121:1863 -> 12.82.137.117:1440 Feb 25 11:37:52 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=20420 F=0x0000 T=242 (#77) host: 64.4.12.121 - msgr-ns67.msgr.hotmail.com Feb 25 11:37:53 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.162.180.161:2638 -> 12.82.137.117:634 Feb 25 11:37:53 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.162.180.161:2638 12.82.137.117:6346 L=48 S=0x00 I=44248 F=0x4000 T=115 SYN (#64) Feb 25 11:37:56 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 12.253.89.52:3155 -> 12.82.137.117:6346 Feb 25 11:38:05 greatwall last message repeated 2 times Feb 25 11:37:56 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.253.89.52:3155 12.82.137.117:6346 L=52 S=0x00 I=52806 F=0x4000 T=53 SYN (#64) Feb 25 11:37:59 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.253.89.52:3155 12.82.137.117:6346 L=52 S=0x00 I=52968 F=0x4000 T=53 SYN (#64) Feb 25 11:38:05 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 12.253.89.52:3155 12.82.137.117:6346 L=52 S=0x00 I=53342 F=0x4000 T=53 SYN (#64) host: 12.253.89.52 - 12-253-89-52.client.attbi.com Feb 25 11:38:11 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.162.180.161:2638 -> 12.82.137.117:6346 Feb 25 11:38:11 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.162.180.161:2638 12.82.137.117:6346 L=48 S=0x00 I=2265 F=0x4000 T=115 SYN (#64) Feb 25 11:38:19 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1505 Feb 25 11:38:19 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1505 L=40 S=0x00 I=19400 F=0x4000 T=56 (#77) host: 63.215.124.47 - unknown.Level3.net Feb 25 11:38:24 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 64.4.12.121:1863 -> 12.82.137.117:1440 Feb 25 11:38:24 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=20421 F=0x0000 T=242 (#77) host: 64.4.12.121 - msgr-ns67.msgr.hotmail.com Feb 25 11:38:33 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 216.136.224.213:5050 -> 12.82.137.117:1442 Feb 25 11:38:33 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 216.136.224.213:5050 12.82.137.117:1442 L=40 S=0x00 I=64659 F=0x0000 T=50 (#77) host: 216.136.224.213 - cs21.msg.sc5.yahoo.com Feb 25 11:38:42 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.183.2.219:1819 -> 12.82.137.117:6346 Feb 25 11:38:51 greatwall last message repeated 2 times Feb 25 11:38:42 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.183.2.219:1819 12.82.137.117:6346 L=48 S=0x00 I=20798 F=0x4000 T=113 SYN (#64) Feb 25 11:38:45 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.183.2.219:1819 12.82.137.117:6346 L=48 S=0x00 I=25918 F=0x4000 T=113 SYN (#64) Feb 25 11:38:51 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.183.2.219:1819 12.82.137.117:6346 L=48 S=0x00 I=37438 F=0x4000 T=113 SYN (#64) host: 172.183.2.219 - ACB702DB.ipt.aol.com Feb 25 11:39:03 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.183.2.219:1819 -> 12.82.137.117:6346 Feb 25 11:39:03 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.183.2.219:1819 12.82.137.117:6346 L=48 S=0x00 I=62782 F=0x4000 T=113 SYN (#64) Feb 25 11:39:24 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 64.4.12.121:1863 -> 12.82.137.117:1440 Feb 25 11:39:24 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 64.4.12.121:1863 12.82.137.117:1440 L=41 S=0x00 I=8025 F=0x0000 T=242 (#77) host: 64.4.12.121 - msgr-ns67.msgr.hotmail.com Feb 25 11:39:33 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 199.250.19.179:3192 -> 12.82.137.117:6346 Feb 25 11:39:36 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 199.250.19.179:3192 -> 12.82.137.117:6346 Feb 25 11:39:33 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 199.250.19.179:3192 12.82.137.117:6346 L=48 S=0x00 I=26557 F=0x4000 T=110 SYN (#64) Feb 25 11:39:36 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 199.250.19.179:3192 12.82.137.117:6346 L=48 S=0x00 I=26593 F=0x4000 T=110 SYN (#64) State of Florida/Dept. of Management Services (NETBLK-FLADMS-CBLK) bldg 4050 esplanade way suite 115d Tallahassee, FL 32399-0950 US Netname: FLADMS-CBLK Netblock: 199.250.16.0 - 199.250.31.255 Feb 25 11:39:38 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 63.215.124.47:80 -> 12.82.137.117:1521 Feb 25 11:39:38 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.215.124.47:80 12.82.137.117:1521 L=40 S=0x00 I=15871 F=0x4000 T=56 (#77) Feb 25 11:39:42 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 199.250.19.179:3192 -> 12.82.137.117:6346 Feb 25 11:39:42 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 199.250.19.179:3192 12.82.137.117:6346 L=48 S=0x00 I=26651 F=0x4000 T=110 SYN (#64) Feb 25 11:39:48 greatwall snort: [1:0:0] TCP to range 1025-60999 {TCP} 216.136.224.213:5050 -> 12.82.137.117:1442 Feb 25 11:39:48 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 216.136.224.213:5050 12.82.137.117:1442 L=40 S=0x00 I=53043 F=0x0000 T=50 (#77)
Unusual System Events =-=-=-=-=-=-=-=-=-=-= Feb 25 12:59:15 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.160.219.251:2160 -> 12.82.137.117:6346 Feb 25 12:59:18 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.160.219.251:2160 -> 12.82.137.117:6346 Feb 25 12:59:15 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.160.219.251:2160 12.82.137.117:6346 L=48 S=0x00 I=9564 F=0x4000 T=111 SYN (#64) Feb 25 12:59:18 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.160.219.251:2160 12.82.137.117:6346 L=48 S=0x00 I=9569 F=0x4000 T=111 SYN (#64) host: 172.160.219.251 - ACA0DBFB.ipt.aol.com Feb 25 12:59:23 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 24.44.239.248:1595 -> 12.82.137.117:6346 Feb 25 12:59:23 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 24.44.239.248:1595 12.82.137.117:6346 L=48 S=0x00 I=7293 F=0x4000 T=112 SYN (#64) host: 24.44.239.248 - ool-182ceff8.dyn.optonline.net Feb 25 12:59:24 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.160.219.251:2160 -> 12.82.137.117:6346 Feb 25 12:59:24 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.160.219.251:2160 12.82.137.117:6346 L=48 S=0x00 I=9585 F=0x4000 T=111 SYN (#64) Feb 25 12:59:26 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 24.44.239.248:1595 -> 12.82.137.117:6346 Feb 25 12:59:32 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 24.44.239.248:1595 -> 12.82.137.117:6346 Feb 25 12:59:26 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 24.44.239.248:1595 12.82.137.117:6346 L=48 S=0x00 I=7350 F=0x4000 T=112 SYN (#64) Feb 25 12:59:32 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 24.44.239.248:1595 12.82.137.117:6346 L=48 S=0x00 I=7483 F=0x4000 T=112 SYN (#64) Feb 25 13:00:55 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.129.114.158:2070 -> 12.82.137.117:6346 Feb 25 13:01:04 greatwall last message repeated 2 times Feb 25 13:00:55 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.129.114.158:2070 12.82.137.117:6346 L=48 S=0x00 I=17943 F=0x4000 T=112 SYN (#64) Feb 25 13:00:58 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.129.114.158:2070 12.82.137.117:6346 L=48 S=0x00 I=17964 F=0x4000 T=112 SYN (#64) Feb 25 13:01:04 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.129.114.158:2070 12.82.137.117:6346 L=48 S=0x00 I=17997 F=0x4000 T=112 SYN (#64) Feb 25 13:01:13 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 207.171.146.82:25150 -> 12.82.137.117:6346 Feb 25 13:01:43 greatwall last message repeated 4 times Feb 25 13:01:13 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 207.171.146.82:25150 12.82.137.117:6346 L=48 S=0x00 I=27918 F=0x4000 T=111 SYN (#64) Feb 25 13:01:16 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 207.171.146.82:25150 12.82.137.117:6346 L=48 S=0x00 I=29454 F=0x4000 T=111 SYN (#64) Feb 25 13:01:23 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 207.171.146.82:25150 12.82.137.117:6346 L=48 S=0x00 I=34318 F=0x4000 T=111 SYN (#64) Feb 25 13:01:35 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 207.171.146.82:25150 12.82.137.117:6346 L=48 S=0x00 I=51982 F=0x4000 T=111 SYN (#64) Feb 25 13:01:43 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 207.171.146.82:25150 12.82.137.117:6346 L=40 S=0x00 I=16752 F=0x0000 T=240 (#77) Iconn LLC (NETBLK-ICONN-BLK-1) 129 Church Street, Suite 508, New Haven, CT 06510 US Netname: ICONN-BLK-1 Netblock: 207.171.128.0 - 207.171.159.255 Maintainer: ICNN Feb 25 13:02:54 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 172.166.9.201:1672 -> 12.82.137.117:6346 Feb 25 13:03:03 greatwall last message repeated 2 times Feb 25 13:02:54 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.166.9.201:1672 12.82.137.117:6346 L=48 S=0x00 I=7003 F=0x4000 T=111 SYN (#64) Feb 25 13:02:57 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.166.9.201:1672 12.82.137.117:6346 L=48 S=0x00 I=7032 F=0x4000 T=111 SYN (#64) Feb 25 13:03:03 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 172.166.9.201:1672 12.82.137.117:6346 L=48 S=0x00 I=7079 F=0x4000 T=111 SYN (#64) Feb 25 13:03:54 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 213.65.209.144:3100 -> 12.82.137.117:6346 Feb 25 13:04:03 greatwall last message repeated 2 times Feb 25 13:03:54 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 213.65.209.144:3100 12.82.137.117:6346 L=48 S=0x00 I=16287 F=0x4000 T=112 SYN (#64) Feb 25 13:03:57 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 213.65.209.144:3100 12.82.137.117:6346 L=48 S=0x00 I=20895 F=0x4000 T=112 SYN (#64) Feb 25 13:04:03 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 213.65.209.144:3100 12.82.137.117:6346 L=48 S=0x00 I=29087 F=0x4000 T=112 SYN (#64) host: 213.65.209.144 - h144n2fls20o980.telia.com Feb 25 13:04:04 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.102.101.61:63942 -> 12.82.137.117:6346 Feb 25 13:04:13 greatwall last message repeated 2 times Feb 25 13:04:04 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.102.101.61:63942 12.82.137.117:6346 L=48 S=0x00 I=4886 F=0x4000 T=114 SYN (#64) Feb 25 13:04:07 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.102.101.61:63942 12.82.137.117:6346 L=48 S=0x00 I=17430 F=0x4000 T=114 SYN (#64) Feb 25 13:04:13 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.102.101.61:63942 12.82.137.117:6346 L=48 S=0x00 I=46358 F=0x4000 T=114 SYN (#64) host: 65.102.101.61 - albq-dsl-gw06poolb61.albq.uswest.net Feb 25 13:04:15 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 213.65.209.144:3100 -> 12.82.137.117:6346 Feb 25 13:04:15 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 213.65.209.144:3100 12.82.137.117:6346 L=48 S=0x00 I=34975 F=0x4000 T=112 SYN (#64) Feb 25 13:04:25 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.102.101.61:63942 -> 12.82.137.117:6346 Feb 25 13:04:25 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.102.101.61:63942 12.82.137.117:6346 L=48 S=0x00 I=36631 F=0x4000 T=114 SYN (#64) Feb 25 13:06:20 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 166.102.202.21:1606 -> 12.82.137.117:6346 Feb 25 13:06:23 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 166.102.202.21:1606 -> 12.82.137.117:6346 Feb 25 13:06:20 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 166.102.202.21:1606 12.82.137.117:6346 L=48 S=0x00 I=13842 F=0x4000 T=111 SYN (#64) Feb 25 13:06:23 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 166.102.202.21:1606 12.82.137.117:6346 L=48 S=0x00 I=13854 F=0x4000 T=111 SYN (#64) host: 166.102.202.21 - r-202.21.alltel.net Feb 25 13:06:29 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.69.71.37:3215 -> 12.82.137.117:6346 Feb 25 13:06:29 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.69.71.37:3215 12.82.137.117:6346 L=48 S=0x00 I=2312 F=0x4000 T=113 SYN (#64) host: 65.69.71.37 - adsl-65-69-71-37.dsl.kscymo.swbell.net Feb 25 13:06:29 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 166.102.202.21:1606 -> 12.82.137.117:6346 Feb 25 13:06:29 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 166.102.202.21:1606 12.82.137.117:6346 L=48 S=0x00 I=13893 F=0x4000 T=111 SYN (#64) Feb 25 13:06:32 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.69.71.37:3215 -> 12.82.137.117:6346 Feb 25 13:06:38 greatwall snort: [1:0:0] TCP to 6346 gnutella {TCP} 65.69.71.37:3215 -> 12.82.137.117:6346 Feb 25 13:06:32 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.69.71.37:3215 12.82.137.117:6346 L=48 S=0x00 I=2356 F=0x4000 T=113 SYN (#64) Feb 25 13:06:38 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 65.69.71.37:3215 12.82.137.117:6346 L=48 S=0x00 I=2455 F=0x4000 T=113 SYN (#64)