[tor-relays] Port scanning via exit node

ken at kenbaker.co.uk ken at kenbaker.co.uk
Sat May 21 16:19:30 UTC 2016


Hi Folks:

I got an abuse complaint from my VPS host, because someone was using my
exit node for port scanning.
Here is the first bit of his (redacted) log.

Attack detail : 4K scans
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason
2016.05.14 17:13:47 CEST xxx.xxx.xxx.xxx:35008 xxx.xxx.xxx.xxx:22 TCP
SYN 60 SCAN:SYN
2016.05.14 17:13:47 CEST xxx.xxx.xxx.xxx:46532 xxx.xxx.xxx.xxx:22 TCP
SYN 60 SCAN:SYN
2016.05.14 17:13:47 CEST xxx.xxx.xxx.xxx:41718 xxx.xxx.xxx.xxx:22 TCP
SYN 60 SCAN:SYN

Hosting dude says he'd appreciate it if I could prevent this, but I'm
not sure how.

I'm afraid I don't have any logs - the VPS got reimaged.

Suggestions how to prevent or mitigate this are welcome.

Cheers,

K.


More information about the tor-relays mailing list