<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A lot of traffic on port 443 (https) to ip 65.52.98.231 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46128#M33893</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;65.52.98.231 is IP address of co2.sls.microsoft.com, hence it has to be genuine, give me some more time for further research.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hardik Shah&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Jul 2014 07:56:58 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-07-07T07:56:58Z</dc:date>
    <item>
      <title>A lot of traffic on port 443 (https) to ip 65.52.98.231</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46127#M33892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a lot connections from my firewall to public IP addresses&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; 65.52.98.231&lt;/STRONG&gt;&lt;/SPAN&gt; port 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our SIEM correlated events and generating the following offense:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Event Name:&amp;nbsp;&amp;nbsp;&amp;nbsp; Excessive Firewall Accepts From Multiple Sources to a Single Destination&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Low Level Category:&amp;nbsp;&amp;nbsp;&amp;nbsp; Firewall Permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Event Description:&amp;nbsp;&amp;nbsp;&amp;nbsp; Excessive Firewall Accepts were detected from multiple hosts to a single destination.&amp;nbsp; More than 100 events were detected from at least 100 unique source IP addresses in 5 minutes. This is common in large organization where the destination is a common web server like Google or a software update site, however connections to unknown hosts should be investigated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Paloalto event:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: courier new,courier;"&gt;&amp;lt;14&amp;gt;Jul&amp;nbsp; 1 06:14:52 1,2014/07/01 06:14:52,0003C102046,TRAFFIC,end,0,2014/07/01 06:14:51,XX.XX.XX.XX,65.52.98.231,XXX.X.XX.XX,65.52.98.231,usuarisInet,oa\segXX,,ms-product-activation,vsys1,Trust,Untrust,ethernet1/2,ethernet1/3,ACUNTIA,2014/07/01 06:14:51,238570,1,49266,443,19777,443,0x400000,tcp,allow,59379,38092,21287,69,2014/07/01 06:14:13,9,computer-and-internet-info,0,328805147,0x0,10.0.0.0-10.255.255.255,United States,0,39,30�&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Event&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3772 events&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://forums.mydigitallife.info/threads/41010-KMSEmulator-KMS-Client-and-Server-Emulation-Source/page180" rel="nofollow"&gt;http://forums.mydigitallife.info/threads/41010-KMSEmulator-KMS-Client-and-Server-Emulation-Source/page180&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Legal/illegal KMS activation. Any idea?&lt;/P&gt;&lt;P&gt;Could someone confirm these are bad and OK, to block?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...and another more:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP addresses&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; 134.170.184.137&lt;/STRONG&gt;&lt;/SPAN&gt; port 80.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/es/ip-address/134.170.184.137/information/" title="https://www.virustotal.com/es/ip-address/134.170.184.137/information/"&gt;https://www.virustotal.com/es/ip-address/134.170.184.137/information/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://malwr.com/analysis/NTk4N2E3N2Q2NjUzNGI1OGIzYzE1Mzc0OWI1MWQ2ODc/" title="https://malwr.com/analysis/NTk4N2E3N2Q2NjUzNGI1OGIzYzE1Mzc0OWI1MWQ2ODc/"&gt;https://malwr.com/analysis/NTk4N2E3N2Q2NjUzNGI1OGIzYzE1Mzc0OWI1MWQ2ODc/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP addresses&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; 134.170.189.4&lt;/STRONG&gt;&lt;/SPAN&gt; port 80.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/es/ip-address/134.170.189.4/information/" title="https://www.virustotal.com/es/ip-address/134.170.189.4/information/"&gt;https://www.virustotal.com/es/ip-address/134.170.189.4/information/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://malwr.com/analysis/ZTUxZmZlYzg3MmZkNDdmMDkyNWI2YmRlMzdmZjg0YmU/" title="https://malwr.com/analysis/ZTUxZmZlYzg3MmZkNDdmMDkyNWI2YmRlMzdmZjg0YmU/"&gt;https://malwr.com/analysis/ZTUxZmZlYzg3MmZkNDdmMDkyNWI2YmRlMzdmZjg0YmU/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP addresses&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; 64.4.11.25&lt;/STRONG&gt;&lt;/SPAN&gt; port 80.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/es/ip-address/64.4.11.25/information/" title="https://www.virustotal.com/es/ip-address/64.4.11.25/information/"&gt;https://www.virustotal.com/es/ip-address/64.4.11.25/information/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://malwr.com/analysis/N2Q4ZTNjNTY4MzRkNDQzYWE3ZmYwMzgzZjI1YjVlOGM/" title="https://malwr.com/analysis/N2Q4ZTNjNTY4MzRkNDQzYWE3ZmYwMzgzZjI1YjVlOGM/"&gt;Malwr - Malware Analysis by Cuckoo Sandbox&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards and thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diego C:smileyconfused:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 07:54:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46127#M33892</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-07-07T07:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: A lot of traffic on port 443 (https) to ip 65.52.98.231</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46128#M33893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;65.52.98.231 is IP address of co2.sls.microsoft.com, hence it has to be genuine, give me some more time for further research.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hardik Shah&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 07:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46128#M33893</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-07T07:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: A lot of traffic on port 443 (https) to ip 65.52.98.231</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46129#M33894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 Microsoft services are hosted on IP address in question. These services are used for activation and update stuff. Refer Bellow mentioned link. &lt;/P&gt;&lt;P&gt;&lt;A href="https://www.robtex.com/dns/co2.sls.microsoft.com.html" title="https://www.robtex.com/dns/co2.sls.microsoft.com.html"&gt;https://www.robtex.com/dns/co2.sls.microsoft.com.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic log says application is "ms-product-activation". Hence I believe some of the applications are trying to activate itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Collect source IP addresses and provide it to system team to find out root cause of simultaneous activation logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bottom line is its not a threat, its genuine traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even SIEM says Excessive session, not malicious session. Its just an alert to administrator, so he can varify if destination is malicious[torrent/bot/etc].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 08:14:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46129#M33894</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-07T08:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: A lot of traffic on port 443 (https) to ip 65.52.98.231</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46130#M33895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find WHOIS for new 3 IP addresses, they all belongs to Microsoft.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.whois.com/whois/64.4.11.25" rel="nofollow"&gt;http://www.whois.com/whois/64.4.11.25&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.whois.com/whois/134.170.189.4" rel="nofollow"&gt;http://www.whois.com/whois/134.170.189.4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.whois.com/whois/64.4.11.25" rel="nofollow"&gt;http://www.whois.com/whois/64.4.11.25&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, virustotal result based on IP address doesnt prove any thing. Nobody can confirm if connections were malicious. In virus total results also most of the anti-virus are not detecting it as a virus.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2014 09:31:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-lot-of-traffic-on-port-443-https-to-ip-65-52-98-231/m-p/46130#M33895</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-07T09:31:29Z</dc:date>
    </item>
  </channel>
</rss>

