<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ID 3805790 and 3805788 DNS lookup in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97791#M44076</link>
    <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Using-Packet-Filtering-through-the-WebGUI/ta-p/56363" target="_blank"&gt;THIS&lt;/A&gt;&amp;nbsp;will help you know what you need for a packet capture but essentially it will be source IP, destination IP, the application if it's reporting as the same one all the time, and then you can filter on further from there. Pass that PCAP along to your SE and they can start the process of either identifiying why it's being hit or getting the signature updated. In the mean time I would disable that signature and let the traffic pass as long as you are confident that the servers that you are connecting to are clean.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Jul 2016 18:03:06 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2016-07-14T18:03:06Z</dc:date>
    <item>
      <title>ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/96949#M44031</link>
      <description>&lt;P&gt;Hello looking for more information on these Threat ID 3805790 and 3805788.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the monitor--&amp;gt; threat --&amp;gt;&lt;/P&gt;&lt;P&gt;Type Field is showing up as spyware&lt;/P&gt;&lt;P&gt;Attacker Field IP is private ip address&amp;nbsp;&lt;/P&gt;&lt;P&gt;Victim Field IP is public ip address. Victim Field public IP address is not the same and it does not match what shows up in the Name Field.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Victim Field IP addresses are clean from all the research I can find.&lt;/P&gt;&lt;P&gt;I would like to know, why palo alto keeps showing up with these ID &amp;nbsp;3805790 and 3805788.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 19:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/96949#M44031</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-12T19:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/96962#M44033</link>
      <description>&lt;P&gt;It looks like both of your threats are generic:weebcan.rapidsys.com identities. Your private address is in the attacker field because it is the "attacker" in this scenario, that information is probably correct. Both were released on 6-29 of this year.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's being identified because rapidsys is being identified as a hacked website at the moment which is why they pushed out the threat with WildFire. I imagine that someone is either accessing or you yourself are hosting a website using the service. It's a pretty sound signature from what I can see; so I don't see how it could really be a false positive.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 20:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/96962#M44033</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-12T20:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97330#M44046</link>
      <description>&lt;P&gt;Thank you for the reply BPry&lt;/P&gt;&lt;P&gt;What I still do not understand is, why is there in Victim Field. IP addresses that do not show up as&amp;nbsp;&lt;SPAN&gt;weebcan.rapidsys.com. For example I am seeing a dns server(private IP) request to a university (Public IP) list as spyware, name, ID all the same. I have many different examples for this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 16:26:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97330#M44046</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-13T16:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97350#M44047</link>
      <description>&lt;P&gt;That I'm not sure. It might be worth doing a packet capture and seeing specifically where that traffic is going and what it's doing. I haven't seen that signature throw a false positive on our 3020s or 200s but if you send the universities public IP address I could connect to it and see if it's something to do with the threat signature or if it's specific to your equipment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 16:57:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97350#M44047</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-13T16:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97382#M44052</link>
      <description>&lt;P&gt;I can put a request in for a packet capture on this, is there a different way to look at this issue without packet capture.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is unviersity IP address&amp;nbsp;192.58.125.30 and here is a another Public IP address&amp;nbsp;192.58.128.30. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for help on this&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 19:01:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97382#M44052</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-13T19:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97403#M44053</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "victim" here should be the DNS server that received the DNS request. Depending on where your firewall is located on your network, it&amp;nbsp;can be your internal DNS server, or an external DNS server where the request got forwarded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 20:34:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97403#M44053</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2016-07-13T20:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97435#M44054</link>
      <description>&lt;P&gt;Well the victim shows up as a extrenal dns server. &amp;nbsp;When I use resolve hostname option on the palo alto device shows what I believe are showing a root dns servers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that all dns lookups are showing as these ID numbers and the Public IP address are not those ID. So, I do not know what to think of this.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2016 20:55:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97435#M44054</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-13T20:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97693#M44068</link>
      <description>&lt;P&gt;I can't get to either of those IP address; but if you know the IP addresses for everything then you could make exceptions to them or disable that ID on your PA all together. I would recommend getting a packet capture done though because it sounds like something with your DNS server specifically that this signature doesn't like, and it could be that nobody else is really seeing the same issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 13:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97693#M44068</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-14T13:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97769#M44075</link>
      <description>&lt;P&gt;Thank you BPry&lt;/P&gt;&lt;P&gt;I know the palo alto has a option for packet capture. I do not have the rights to do one. Would you please provide some what kind of packet capture setting that I can put in the request for this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the packet capture is not need on the palo alto, where the packet capture should be take from with a few setting applied.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 16:15:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97769#M44075</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-14T16:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97791#M44076</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Using-Packet-Filtering-through-the-WebGUI/ta-p/56363" target="_blank"&gt;THIS&lt;/A&gt;&amp;nbsp;will help you know what you need for a packet capture but essentially it will be source IP, destination IP, the application if it's reporting as the same one all the time, and then you can filter on further from there. Pass that PCAP along to your SE and they can start the process of either identifiying why it's being hit or getting the signature updated. In the mean time I would disable that signature and let the traffic pass as long as you are confident that the servers that you are connecting to are clean.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 18:03:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97791#M44076</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-07-14T18:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97797#M44077</link>
      <description>&lt;P&gt;Thank you BPry for help on this and I will check this out and hope to get back to you on why this is happening&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 18:50:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/97797#M44077</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-14T18:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: ID 3805790 and 3805788 DNS lookup</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/98047#M44089</link>
      <description>&lt;P&gt;Last night I got the packet capture setup, I check the montior ---&amp;gt;threat --&amp;gt; nothing show up there on these ID's&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I check the PANW Threat Vault on these ID they have been udpated now.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone now what change ???&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 13:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/id-3805790-and-3805788-dns-lookup/m-p/98047#M44089</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-07-15T13:49:47Z</dc:date>
    </item>
  </channel>
</rss>

