I'm using PeerBlock at my apt in auburn al. via Charter.About every 10 minutes i get spammed by a connection 8-12 times. Here is the connection info:Range: F-SOS/F-SecureSource: 5.207.228.242Destination: 206.112.100.132Protocol: Unknown*sometimes* the source comes from my own ip (192.168.1.x)The ARIN whois reports this:
1/10/2010 2:37:31 AM
Are you sure 206.112.100.132 isn't your address?5.207.228.242 is unallocated.
1/10/2010 1:19:11 PM
negative, my ip is71.91.20.xxI'm confused as to why *sometimes* it originates from my 192.168.1.x ip in the middle of the spam. I.E. it will come from the 5.207.228.242 for say..the first 3 or 4, then maybe 2 or 3 from the 192.168.1.x, then back to the 5.207.228.242, but all sharing the same destination of 206.112.100.132.The ARIN whois report of 5.207.228.242 is:
1/10/2010 4:34:59 PM
do you have hamachi installed? my hamachi used to give me a 5.xxx address.The 5.0.0.0/8 network is used to avoid collisions with private IP networks that might already be in use on the client side]
1/10/2010 4:46:12 PM
5.207.228.242 is an unallocated address. Nobody should be using it.Sure you don't have a trojan/malware/virus/etc?I'm not familiar with PeerBlock...do you have logs to see what on your computer is originating requests?[Edited on January 10, 2010 at 4:50 PM. Reason : I need to type faster...nobody should be using 5.xxx, certainly not anyone external to your LAN.][Edited on January 10, 2010 at 4:51 PM. Reason : hamachi is a really good idea, though][Edited on January 10, 2010 at 4:51 PM. Reason : now you're ghostediting ]
1/10/2010 4:47:11 PM
Nice call, I do have hamachi installed, and that may be the issue, ill disable the connection and see if it continues.Ive done several different scans and am fairly positive i dont have any trojans/malware/virusNo, peerblock does not show what on my computer is originating the requests.Ill post again with the update of disabling hamachi
1/10/2010 4:56:20 PM
1/10/2010 5:00:17 PM
Ok, after disabling hamachi i no longer have any outgoing connections from the 5.207.228.242 ip. However, I still have outgoing connection spams from my own internal ip: 192.168.1.3 as the source and 206.112.100.132 as the destination.The connection was attempted 29 times, bursting 4-8 times within a minute or 2, then repeating that pattern every 10-15 minutes for over an hour.for quick reference:source: 192.168.1.3destination: 206.112.100.132Range: F-SOS/F-SecureProtocol: UnknownAction: BlockedI wanted to also add that just recently, over xmas break, I was back home in apex, NC using my parents net. I had none of this spam and never a connection from my own computer as the source.Here is a cap of my PeerBlockAny more thoughts?[Edited on January 11, 2010 at 1:37 PM. Reason : bad link][Edited on January 11, 2010 at 1:38 PM. Reason : .][Edited on January 11, 2010 at 1:39 PM. Reason : .]
1/11/2010 1:36:10 PM
http://www.dslreports.com/forum/r17871432-Charter-Corrupting-DNS-protocol-ie-hijacking-hosts
1/11/2010 1:47:58 PM
I had previously read that article and it would make sense if the connection was being made every time i entered an incorrect domain. But those connections are being attempted while the computer is idle.That pic i posted above occurred while I was in class
1/11/2010 4:34:38 PM
something else is probably doing a DNS query and its getting eaten by comcast. Setup wireshark and look for dns queries prior to the 206.112.100.132 stuff. Wireshark will also show you the contents of the 206.112.100.132 packets too, so you can see what they actually are.
1/11/2010 5:07:51 PM
alternatively just get rid of peerblock since its dumb as hell
1/11/2010 5:14:39 PM
1/11/2010 6:23:27 PM
i agree with ^^^
1/11/2010 6:57:50 PM
I have wireshark up and running, but i'm having trouble filtering it so that it only shows packets sent to 206.112.100.132.From the help section examples, the filter should read "net 206.112.100.132" (i think) which i have applied. Is this the right way to filter it?
1/11/2010 7:20:17 PM
there are kind of two "filters" in wireshark. Theres the capture filture which you configure before starting the capture, and then theres the live filter which you put in that box during the cap to filter the results. For the caputre filter i think its "host 206.112.100.132" (there should be saved filters you can look at for examples). For the live cap filter, it would be ip.addr==206.112.100.132. That filter will turn green when the syntax is all good.
1/11/2010 7:44:50 PM
I left wireshark running last night while active on my computer and left peerblock up this afternoon while in class, No connection attempts to the 206.112.100.132 have been made. But there have been several attempts from my 192.168.1.3 local to 67.159.44.118 which is FDC servers in chicago, which Peerblock lables as antiP2P. This all happened while i was in class, with utorrent seeding. Are these connections coming from my utorrent?
1/12/2010 3:31:28 PM
Looks like they're a hosting company. Could be the mpaa trying to steal your data or it could be some seedbox with a bunch of bandwidth that you cant get to becuase you use some piece of shit software to block it.Seriously. peer bock does 0 to prevent anyone from seeing your computer in the swarm. All the MPAA/RIAA/whoever you're scared of has to do is scrape the tracker and they have everyone in the torrent. That said, to actually figure out what type of traffic that is since peerblocker isn;t smart enough, you can either look at what ports your client is using (if its set to random consider setting it to a specific port) or remove your capture filter from wireshark and once you capped enough data, use the search tool to narrow down individual packets for inspection.
1/12/2010 3:38:55 PM
my utorrent uses 42000 which is why i was confused by the connection attempts to FDC servers coming from *seemingly* random ports, meaning utorrent wasnt the one trying to make the connection.I'll run wireshark and see if i can figure out whats causing it
1/12/2010 5:06:39 PM
1/14/2010 7:53:12 PM
First off trackers contain completion info as well as ip information. If a client reports the to tracker that its downloaded information, the hashing system guarantees that data matches the files in the torrent. All they need to know is that the files in the torrent are copyrighted data and that someone has reported transfering the data back to the tracker. The dont need to connect directly to a peer to guarantee that they actually participated.Second, this:
1/14/2010 10:33:09 PM
1/14/2010 11:27:09 PM