Hi,
I have detected from our users that they communicate below (where our
internal ip address has changed to x.x.x.x) with your site which port
1983/tcp which is register as Loophole Test Protocol. Is your website
using port 1983/tcp for any purpose ? or does it being fool by someone
else?
*Aug 3 09:44:12: %SEC-6-IPACCESSLOGP: list acl_inside permitted tcp
x.x.x.x(49211) -> 64.69.68.158(1983), 1 packet
*Aug 3 09:44:15: %SEC-6-IPACCESSLOGP: list acl_inside permitted tcp
x,.x.x.x(49213) -> 64.69.68.158(1983), 1 packet
*Aug 3 09:44:20: %SEC-6-IPACCESSLOGP: list acl_inside permitted tcp
x.x.x.x(49214) -> 64.69.68.158(1983), 1 packet
*Aug 3 09:44:33: %SEC-6-IPACCESSLOGP: list acl_inside permitted tcp
x.x.x.x(49215) -> 64.69.68.158(1983), 1 packet
Bests Regards,
Thanh Nguyen
Senior Global IT Security Analyst
Reader's Digest (Australia) Pty Limited
26 Waterloo St, Surry Hills, NSW 2010 Australia
GPO Box 4353, Sydney, NSW 2001
Phone: +61 2 9690 6154
Fax: +61 2 9690 6444
E-mail: [EMAIL PROTECTED]
Your opinion counts! - > http://www.readersdigest.com.au