|
|
|
Re: Search logging for a specific NAT connection [message #139339 is a reply to message #139333] |
Wed, 11 April 2018 23:12  |
benjalamelami
Messages: 72 Registered: October 2010 Location: Cali
|
|

|
|
Yes... well, thank you both. I think I missed my chance to find it, but I have a good candidate to look for.
The thing is somehow, one single request slipped through the firewall and I got flagged as spammer for spreading conficker. And then, I do not know how else to know which host did.
They said:
Quote:Behind a NAT, you should be able to find the infected machine by looking for attempted connections to IP address "104.244.14.252" or host name "n/a" on any port with a network sniffer such as Wireshark. Equivalently, you can examine your DNS server or proxy server logs to references to "104.244.14.252" or "n/a". See Advanced Techniques for more detail on how to use Wireshark - ignore the references to port 25/SMTP traffic - the identifying activity [/code]is NOT[/code] on port 25.
Thanks anyway.
I will be ready next time.
|
|
|