Don't you have some flow data you can analyze for those time frames to see what 
on your net it transmitting ?

If not I'd suggest you set something up and see all outbound traffic to port 22.

-- 
 J. Hellenthal

The fact that there's a highway to Hell but only a stairway to Heaven says a 
lot about anticipated traffic volume.

> On Oct 31, 2024, at 13:40, Neel Chauhan <n...@neelc.org> wrote:
> 
> Hi,
> 
> I am a customer of Verizon Fios in NYC and received a very interesting abuse 
> complaint today from ab...@verizon.com.
> 
> I got SSH bruteforce attempts between my IP address and this IPv4 prefix: 
> 202.91.160.0/20
> 
> This is hosted on a network called "AS17452 Bitstop Inc".
> 
> My connection runs Tor relays, but not exit relays. I doubt it's Tor since 
> when I had Google Fiber or CenturyLink even when running Tor relays I never 
> got those complaints. I use a MikroTik core router so maybe it got malware, 
> although I recently updated it from 7.15.3 to 7.16.1. I decided to filter the 
> prefix.
> 
> Maybe a Windows PC on our network is infected. Maybe it's my Rocky Linux 
> servers. Should I probably get a Supermicro/Deciso box and run an OPNsense 
> firewall instead? But I never got complaints from Frontier or Optimum when I 
> put MikroTik routers on both ISPs too, that for accounts not in my name. 
> Maybe it's a false positive and just TCP forgery pretending to me be (I hope 
> so).
> 
> Just letting you know.
> 
> -Neel
> 
> === REDACTED COMPLAINT BELOW ===
> 
> Dear Verizon Online Customer,
> 
> On 10-30-2024, your account was reported to have been used in an attempt to 
> gain unauthorized access to another system, or to transmit malicious traffic 
> to another Internet user.
> 
> It is possible that a device connected to your network may have been infected 
> by a virus or a botnet that is causing this action.
> 
> Report and/or Logs:
> 
> To assist you in understanding the situation, we have provided the relevant 
> log data below, with timestamps adjusted to our GMT +8 timezone:
> 
> 
> DateTime Action AttackClass SourceIP Srcport Protocol DestinationIP DestPort
> 0 30-Oct-2024 13:37:21 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.24 
> 22
> 1 30-Oct-2024 13:49:38 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.24 
> 22
> 2 30-Oct-2024 14:00:01 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.24 
> 22
> 3 30-Oct-2024 14:10:12 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.24 
> 22
> 4 30-Oct-2024 15:17:15 DENIED 108.30.XXX.XXX 32769 TCP 202.91.162.17 22
> 5 30-Oct-2024 15:18:29 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.39 
> 22
> 6 30-Oct-2024 15:23:08 DENIED 108.30.XXX.XXX 54688 TCP 202.91.163.179 22
> 7 30-Oct-2024 15:30:22 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.47 
> 22
> 8 30-Oct-2024 15:47:32 BLOCKED attempted-recon 108.30.XXX.XXX 0 202.91.162.24 
> 22
> 9 30-Oct-2024 15:58:03 DENIED 108.30.XXX.XXX 50405 TCP 202.91.163.143 22
> 
> Please immediately ensure your anti-virus and anti-malware software is 
> properly updated. Please perform full system scans on your device(s). 
> [Including - computers, tablets, cellular devices, network attached storage, 
> security camera recorders (DVR or NVR), and IOT devices, where possible.]
> 
> Additional information and removal guidance of detected malware may be found 
> on the website of your scanner(s) manufacturer.
> 
> It is difficult to verify the presence of an exact virus or malware infecting 
> a device without a full system scan with up-to-date software.
> 
> Installing the most recent firmware and software updates can also assist in 
> securing your device(s). Please follow the device manufactures processes for 
> any updates.
> 
> If you are unable to take immediate action, it would be advisable to remove 
> the device(s), which may be infected, from your network and the Internet 
> connection until it has been properly cleaned. This may be easily done by 
> unplugging the network cable that connects the device to the router. For 
> wireless devices removing power from the device will keep it off it the 
> network.
> 
> Note: this information is being provided as a courtesy; you are solely 
> responsible for any changes you make to your device(s) or network.
> 
> Verizon Policy:
> 
> If you do not take steps to resolve this issue, we may be forced to take 
> further action. Actions could include the suspension or termination of your 
> service until the issue is resolved, in order to ensure the safety of our 
> network, and the safety of other Internet users.
> 
> Please carefully review these agreements, which can be viewed at:
> http://www.verizon.com/about/terms/
> 
> Any future violation will result in further action being taken, up to,
> and including, the termination of your service.
> 
> 
> Sincerely,
> 
> Verizon Global IP Abuse
> http://www.verizon.com/about/terms/
> http://www.verizon.com/securityinfo
> ab...@verizon.com

Reply via email to