Question : Curious about connections on our Mail Server

We ran netstat and noticed some odd connections and were wondering what other peoples opinions were.  We went through the processess.. nothing seems out of the ordinary.  Obviously these IPs showing up have nothing to do with our network or mail system so we are looking for some guidance.

Thanks!

Log:

TCP    192.168.6.5:25         85.198.168.27:3229     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3235     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3283     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3446     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3455     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3501     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3519     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3535     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3569     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3579     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3585     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3637     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3648     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3664     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3668     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3720     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3735     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3744     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3792     TIME_WAIT
TCP    192.168.6.5:25         85.198.168.27:3824     TIME_WAIT

TCP    192.168.6.5:25         222.114.236.12:2917    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:60061    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:60433    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:61451    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:61713    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:62115    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:62175    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:62395    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:62409    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:63079    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:63321    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:63369    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:63519    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:63919    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:64583    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:64775    ESTABLISHED
TCP    192.168.6.5:110        80.84.113.135:64933    LAST_ACK
TCP    192.168.6.5:110        80.84.113.135:65451    ESTABLISHED

TCP    192.168.6.246:110      80.84.113.135:60161    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:60651    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:60961    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:61095    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:61265    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:62389    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:62509    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:62941    CLOSING
TCP    192.168.6.246:110      80.84.113.135:63295    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:63589    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:63885    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:63957    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:64195    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:64593    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:65093    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:65271    ESTABLISHED
TCP    192.168.6.246:110      80.84.113.135:65407    ESTABLISHED

Answer : Curious about connections on our Mail Server

This happens all the time, and unfortunately you can't do much about it. Assuming they aren't actually transferring any mail into your email system, I suspect those entries are something to do with a port scanner which is attempting to connect through to ports 25 (SMTP) and 110 (POP3), and if successful, your IP address might be added to a list of addresses which are "compromised" - i.e. they could possibly be used by a hacker. Port scanners test a range of consecutive IP addresses and should they find one with sensitive ports such as telnet, SMTP, HTTPS or the like open and available, they may attempt to connect and see what they can find.

SMTP in particular is quite a sensitive topic; if someone finds an SMTP server which is also an open relay, they could potentially spam it at will, and possibly get that server blacklisted. It is for this reason that port 25 is commonly searched for by hackers and spammers.

Sadly, just about the only way to stop this happening is to unplug yourself from the 'net. For all the time anybody is connected to the Internet, people are going to attempt to access their network, infiltrate their firewall. It is highly unlikely they are targeting you in particular - you are simply being picked on like hundreds of thousands of other people around the globe who are located on a similar IP range to yourself.

To make sure you're secure, just ensure only the required ports for the correct operation of your server and network to correctly function are opened through the firewall through to the DMZ and, more importantly, the internal network. Any systems located in your DMZ should be checked to ensure they are not compromised, and I strongly recommend that any systems in the DMZ which require static port mappings to communicate with systems in the LAN are moved inside the LAN. One common mistake is to place Exchange Front-end (or OWA, SMTP relay) servers in the DMZ, but since these require sensitive Active Directory ports open to function, it poses a major security risk.

I did some lookups on the IP addresses and couldn't find much, although I do know they are allocated to either Korea Telecoms, someone in Russia and another in Ukraine. Provided all your servers and systems are patched, up to date and confirmed as secured, you can't really get around this issue too much and you don't have much to worry about.

-tigermatt
Random Solutions  
 
programming4us programming4us