I block and log rfc 1918 connection attempts and am seeing the following 
in pflog continuously ad nauseum:

Apr 10 15:10:21.414289 rule 9/(match) block in on fxp1:
172.21.153.70.6293 > 68.61.77.3.50716: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:22.833822 rule 9/(match) block in on fxp1:
172.21.233.57.6293 > 68.61.77.3.54518: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:23.789209 rule 9/(match) block in on fxp1:
172.21.153.22.6293 > 68.61.77.3.57836: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:24.256891 rule 9/(match) block in on fxp1:
172.21.97.2.6293 > 68.61.77.3.50417: [|tcp] (DF) [tos 0x20]
Apr 10 15:10:24.821674 rule 9/(match) block in on fxp1:
172.21.225.72.6293 > 68.61.77.3.53965: [|tcp] [tos 0x20]
Apr 10 15:11:28.559238 rule 9/(match) block in on fxp1:
172.21.240.45.6293 > 68.61.77.3.58733: [|tcp] (DF) [tos 0x20]
Apr 10 15:11:29.397925 rule 9/(match) block in on fxp1:
172.21.240.63.6293 > 68.61.77.3.62274: [|tcp] [tos 0x20]

The source IP addresses do repeat (but not in a specific order) and the 
source port remains constant at 6293.

As these addresses (AFAIK) aren't generally routed I'm wondering about 
their source.

Possibly all spoofed, but as I'm using cable service, they could also be 
from a system on the local shared subnet. Another thought is that the 
ISP (Comcast) is using and routing them for their own purposes (VOIP 
service, etc.). Any ideas?

Thanks.

-- 
Chris

Reply via email to