<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to Avoid Remote SSH Scan in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-avoid-remote-ssh-scan/m-p/49651#M36571</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I have a lot of events "deny" followed by other "allow"; All of these to port 22 (SSH) from remote host to several IP(s) in my Untrust and DMZ Zone.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="SSH list.jpg" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/20137_SSH list.jpg" style="height: 77px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;lt;14&amp;gt;Jun 24 04:01:17 fw2orgt 1,2015/06/24 04:01:16,0003C102047,&lt;STRONG&gt;TRAFFIC&lt;/STRONG&gt;,drop,0,2015/06/24 04:01:16,&lt;SPAN style="color: #ff0000;"&gt;46.228.199.253&lt;/SPAN&gt;,213.0.58.124,0.0.0.0,0.0.0.0,&lt;STRONG&gt;rule76&lt;/STRONG&gt;,,,not-applicable,vsys1,&lt;STRONG&gt;Untrust,Untrust&lt;/STRONG&gt;,ethernet1/3,,ACUNTIA,2015/06/24 04:01:16,0,1,43007,22,0,0,0x0,tcp,&lt;STRONG&gt;deny&lt;/STRONG&gt;,74,74,0,1,2015/06/24 04:01:17,0,any,0,418084793,0x0,DE,ES,0,1,0 �&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;IMG alt="SSH.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/20136_SSH.jpg" style="height: 50px; width: 620px;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;A href="http://www.abuseipdb.com/report-history/46.228.199.253" title="http://www.abuseipdb.com/report-history/46.228.199.253"&gt;http://www.abuseipdb.com/report-history/46.228.199.253&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;A href="https://cymon.io/46.228.199.253" title="https://cymon.io/46.228.199.253"&gt;https://cymon.io/46.228.199.253&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Categories for this IP 46.228.199.253: Hacking, FTP Brute-force,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "rule76" is the last in my security policy rules:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="rule76.jpg" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/20138_rule76.jpg" style="height: 99px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;These attempts could indicate an attack SSH (SSH Port Scan, Brute Force SSH, etc) and more if the source IPs have bad reputation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reputation of the other source IP:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/1.24.247.113" style="font-size: 10pt; line-height: 1.5em;" title="http://www.abuseipdb.com/report-history/1.24.247.113"&gt;http://www.abuseipdb.com/report-history/1.24.247.113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/1.24.247.113" title="https://cymon.io/1.24.247.113"&gt;https://cymon.io/1.24.247.113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/123.212.190.217" title="http://www.abuseipdb.com/report-history/123.212.190.217"&gt;http://www.abuseipdb.com/report-history/123.212.190.217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/123.212.190.217" title="https://cymon.io/123.212.190.217"&gt;https://cymon.io/123.212.190.217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/91.200.14.96" title="http://www.abuseipdb.com/report-history/91.200.14.96"&gt;http://www.abuseipdb.com/report-history/91.200.14.96&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/91.200.14.96" title="https://cymon.io/91.200.14.96"&gt;https://cymon.io/91.200.14.96&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/192.3.108.133" title="http://www.abuseipdb.com/report-history/192.3.108.133"&gt;http://www.abuseipdb.com/report-history/192.3.108.133&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/192.3.108.133" title="https://cymon.io/192.3.108.133"&gt;https://cymon.io/192.3.108.133&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I have this Zone Proteccion Profile in my firewall:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Zone Protection Profile.jpg" class="jive-image image-3" src="https://live.paloaltonetworks.com/legacyfs/online/20139_Zone Protection Profile.jpg" style="height: 255px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;And I applied my Untrust zone:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Zone.jpg" class="jive-image image-5" src="https://live.paloaltonetworks.com/legacyfs/online/20141_Zone.jpg" style="height: 447px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;How to Avoid Remote SSH Scan?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any help with this issue.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jun 2015 16:18:18 GMT</pubDate>
    <dc:creator>SOC_CSG</dc:creator>
    <dc:date>2015-06-24T16:18:18Z</dc:date>
    <item>
      <title>How to Avoid Remote SSH Scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-avoid-remote-ssh-scan/m-p/49651#M36571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I have a lot of events "deny" followed by other "allow"; All of these to port 22 (SSH) from remote host to several IP(s) in my Untrust and DMZ Zone.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="SSH list.jpg" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/20137_SSH list.jpg" style="height: 77px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;lt;14&amp;gt;Jun 24 04:01:17 fw2orgt 1,2015/06/24 04:01:16,0003C102047,&lt;STRONG&gt;TRAFFIC&lt;/STRONG&gt;,drop,0,2015/06/24 04:01:16,&lt;SPAN style="color: #ff0000;"&gt;46.228.199.253&lt;/SPAN&gt;,213.0.58.124,0.0.0.0,0.0.0.0,&lt;STRONG&gt;rule76&lt;/STRONG&gt;,,,not-applicable,vsys1,&lt;STRONG&gt;Untrust,Untrust&lt;/STRONG&gt;,ethernet1/3,,ACUNTIA,2015/06/24 04:01:16,0,1,43007,22,0,0,0x0,tcp,&lt;STRONG&gt;deny&lt;/STRONG&gt;,74,74,0,1,2015/06/24 04:01:17,0,any,0,418084793,0x0,DE,ES,0,1,0 �&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;IMG alt="SSH.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/20136_SSH.jpg" style="height: 50px; width: 620px;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;A href="http://www.abuseipdb.com/report-history/46.228.199.253" title="http://www.abuseipdb.com/report-history/46.228.199.253"&gt;http://www.abuseipdb.com/report-history/46.228.199.253&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;A href="https://cymon.io/46.228.199.253" title="https://cymon.io/46.228.199.253"&gt;https://cymon.io/46.228.199.253&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Categories for this IP 46.228.199.253: Hacking, FTP Brute-force,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "rule76" is the last in my security policy rules:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="rule76.jpg" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/20138_rule76.jpg" style="height: 99px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;These attempts could indicate an attack SSH (SSH Port Scan, Brute Force SSH, etc) and more if the source IPs have bad reputation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reputation of the other source IP:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/1.24.247.113" style="font-size: 10pt; line-height: 1.5em;" title="http://www.abuseipdb.com/report-history/1.24.247.113"&gt;http://www.abuseipdb.com/report-history/1.24.247.113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/1.24.247.113" title="https://cymon.io/1.24.247.113"&gt;https://cymon.io/1.24.247.113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/123.212.190.217" title="http://www.abuseipdb.com/report-history/123.212.190.217"&gt;http://www.abuseipdb.com/report-history/123.212.190.217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/123.212.190.217" title="https://cymon.io/123.212.190.217"&gt;https://cymon.io/123.212.190.217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/91.200.14.96" title="http://www.abuseipdb.com/report-history/91.200.14.96"&gt;http://www.abuseipdb.com/report-history/91.200.14.96&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/91.200.14.96" title="https://cymon.io/91.200.14.96"&gt;https://cymon.io/91.200.14.96&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.abuseipdb.com/report-history/192.3.108.133" title="http://www.abuseipdb.com/report-history/192.3.108.133"&gt;http://www.abuseipdb.com/report-history/192.3.108.133&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cymon.io/192.3.108.133" title="https://cymon.io/192.3.108.133"&gt;https://cymon.io/192.3.108.133&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I have this Zone Proteccion Profile in my firewall:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Zone Protection Profile.jpg" class="jive-image image-3" src="https://live.paloaltonetworks.com/legacyfs/online/20139_Zone Protection Profile.jpg" style="height: 255px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;And I applied my Untrust zone:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Zone.jpg" class="jive-image image-5" src="https://live.paloaltonetworks.com/legacyfs/online/20141_Zone.jpg" style="height: 447px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333330154419px;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;How to Avoid Remote SSH Scan?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any help with this issue.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: monospace; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2015 16:18:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-avoid-remote-ssh-scan/m-p/49651#M36571</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2015-06-24T16:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to Avoid Remote SSH Scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-avoid-remote-ssh-scan/m-p/49652#M36572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on your Zone Protection Profile, the TCP port scan should trigger if there are 100 entries within a 2-second span. From the first screenshot you uploaded I see that there are 183 events from the IP in question, but no info on events per second (apologies if I missed it). Were those 183 in a very fast time frame or were they spread out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding your logs, the first 99 entries in a 2-second span would be skipped by the Zone Protection Profile, and would go through normal rule processing. So you should expect to see a fair amount of logs showing it denied by your catch-all rule 76. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With respect to IP reputation, that is not something the Zone Protection Profile would trigger on. Reputation can become a gray area because a legitimate host could be compromised, leading to a false negative. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to increase your interval or decrease the threshold, you should see sooner triggering for scans. You do take the risk of stopping legitimate traffic with too low a threshold, so you may have to experiment with it to find the right levels for your specific environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Greg Wesson&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2015 23:44:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-avoid-remote-ssh-scan/m-p/49652#M36572</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2015-06-24T23:44:06Z</dc:date>
    </item>
  </channel>
</rss>

