From: George Orwell on
"ASCII" <me2(a)privacy.net> wrote in message news:4b8559bd.4175609(a)EDCBIC...
> at least I have a warmer fuzzier feeling about it.
That's only because you pissed your pants again.

Il mittente di questo messaggio|The sender address of this
non corrisponde ad un utente |message is not related to a real
reale ma all'indirizzo fittizio|person but to a fake address of an
di un sistema anonimizzatore |anonymous system
Per maggiori informazioni |For more info
https://www.mixmaster.it

From: RayLopez99 on
On Feb 21, 8:34 pm, "Ant" <n...(a)home.today> wrote:

>
> The IP address (124.120.170.40) associated with that generically-named
> host belongs to trueinternet.co.th, an ISP in Thailand. It's the kind
> of name that gets assigned to home user IPs.
>
> You should be highly suspicious of it. Find out what process owns the
> connection.

I think I detect a pattern (I am researching it now). These kind of
funny addresses seem to appear when I'm connected to the internet by
firing up a browser. So, like you suggested in another post, it could
be something "innocent" like a request to the browser to ping this
remote site (for marketing purposes). But how they would get a
browser to ping is not clear to me, but it's a programming detail
that's probably possible.

Of course the simpler explanation is that there is a undetectable
virus (that escaped my antivirus program) that is alive in my system
and attempts to 'dial out', but is blocked by the firewall. Why it
springs up at certain times is of course simply due to the way it is
programmed, to act irregularly.

All of this is new to me--I always assumed that with firewalls you can
set them up and forget them, I did not realize you have to monitor
them--a lot of work. There should be a better way (set up and
forget).

RL
From: Ant on
"RayLopez99" wrote:

> I think I detect a pattern (I am researching it now). These kind of
> funny addresses seem to appear when I'm connected to the internet by
> firing up a browser.

Perhaps it's a BHO (Browser Helper OBject). Sysinternals' AutoRuns
will show those.

> So, like you suggested in another post, it could
> be something "innocent" like a request to the browser to ping this
> remote site (for marketing purposes). But how they would get a
> browser to ping is not clear to me, but it's a programming detail
> that's probably possible.

It could be a normal HTTP request via script or an HTML element which
pointed to the host. The link in the page source might look something
like this:
http://123.456.789.255:33137/stat.php?id=xyz

That's an invalid IP address, by the way, but the port (33137) is
unconventional and would be the reason why testing for a web server
on that host (at the usual port 80) would fail.


From: Ant on
"Ant" wrote:

>> So, like you suggested in another post, it could
>> be something "innocent" like a request to the browser to ping this
>> remote site (for marketing purposes). But how they would get a
>> browser to ping is not clear to me, but it's a programming detail
>> that's probably possible.
>
> It could be a normal HTTP request via script or an HTML element which
> pointed to the host. The link in the page source might look something
> like this:
> http://123.456.789.255:33137/stat.php?id=xyz
>
> That's an invalid IP address, by the way, but the port (33137) is
> unconventional and would be the reason why testing for a web server
> on that host (at the usual port 80) would fail.

On second thoughts, that would register as incoming traffic so I may
be mistaken about the possibility of affiliate clicks generating
unexpected outgoing packets.

Anyway, I see you've found the likely culprit - Skype. Their protocol
is proprietory so you would have to trust their motives for making
these connections. Since you're blocking them and, presumably Skype
still works, all should be well.


From: RayLopez99 on
On Feb 27, 5:19 pm, "Ant" <n...(a)home.today> wrote:

> Anyway, I see you've found the likely culprit - Skype. Their protocol
> is proprietory so you would have to trust their motives for making
> these connections. Since you're blocking them and, presumably Skype
> still works, all should be well.

Yes, that's the only thing I could think of other than undetected/
undetectable malware, and BHOs (which you say will generate an
download UDP, so there should be some symmetry in IP addresses, which
there is not in my log). BTW this stuff seems to happen around 7:30
pm and when I fire up the machine, but not in the account that does
not have Skype (the Admin account), so that further fingers Skype as
the culprit. Since Skype works despite the blocked UDPs, like you
say, it's not a big deal but I will continue to monitor it.

Thanks Ant you have been a big help. Without you I never would have
even thought about the firewall...

Now back to my programming project (doing an ASP.NET project now
involving a web service).

RL