Sponsored Content
Special Forums Cybersecurity Continual knocking on port 443 from foreign IP address Post 302893838 by vbe on Friday 21st of March 2014 10:15:20 AM
Old 03-21-2014
Bots?
Ever looked where the IP is from?
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Sunblade shows 2 MAC address on same port

Please, can someone tell me why my SunBlade would be showing 2 different but similar MAC addresses on the same port on the Switch? The switch shows all other Workstations with 1 MAC on each port, but the SunBlade is showing 2. Thanks in advance for any insight.... (1 Reply)
Discussion started by: GoneCrazy
1 Replies

2. Solaris

How To Change 5 port Ip Address Solaris?

Hello i'm newbie in solaris, anybody know how to change five port solaris 10? exmpe: bge0, bge1, bge2, etc. anybody can help me with the script implementasi... and logical how solaris work. thank so much:b: (2 Replies)
Discussion started by: yanto85
2 Replies

3. Cybersecurity

Port Address Changing....

Is there a software solution to stop intruders from changing my port addresses? Causes IPmap to crash. Platform is OS/X Leopard. (1 Reply)
Discussion started by: aleatory
1 Replies

4. IP Networking

Configure squid to listen on any IP address with port 80

Hi, I am trying to configure a transparent squid cache. When I try to use the below option in squid.conf, squid listens on port 80 only for the IP address configured on the system's interface. http_port 80 transparent But I want squid to accept connections for any IP address on port 80.... (3 Replies)
Discussion started by: Learner32
3 Replies

5. Cybersecurity

Listening to port when no IP address is assigned

Hi Pals Consider a case where the network interface is there and it is connected to a network. Only thing left here is I need to set a static ip/ip though dhcp (though ifconfig) I heard that it is possible to listen even if the ip address is not set. So is there any possibility of an attack over... (1 Reply)
Discussion started by: sreejithc
1 Replies

6. Solaris

Allow usage of port 80 and 443

I am trying to install Sun Java Web Server using an ordinary user with no root/sudo rights. I need to allow this web server to use ports 80 and 443. How can this be done?:confused: (1 Reply)
Discussion started by: emealogistics
1 Replies

7. UNIX for Advanced & Expert Users

What is the foreign address?

hi i want to open port 9100 and the connect server could not to connect to my application this my results of netstat tulpn Active Internet connections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 localhost:9100 ... (3 Replies)
Discussion started by: mohammad alshar
3 Replies

8. HP-UX

How to open 443 port in HP-UX?

Hello Experts, I want to open the port 443 on my HP-UX system. can you please help ? Thanks in advance. (1 Reply)
Discussion started by: purushottamaher
1 Replies

9. IP Networking

netstat local and foreign address relationship.

Hi All, Can you please help me in understanding the relationship between local and foreign address in the output of netstat -an. Output 1 ---------- 162.103.162.37.50224 162.103.162.35.9511 49640 0 49640 0 ESTABLISHED 162.103.162.37.50263 162.103.162.35.9512 49640 0... (1 Reply)
Discussion started by: Girish19
1 Replies
hostname(5)							File Formats Manual						       hostname(5)

NAME
hostname - host name resolution description DESCRIPTION
Hostnames are domains. A domain is a hierarchical, dot-separated list of subdomains. For example, the machine in the subdomain of the sub- domain of the Internet Domain Name System would be represented as (with no trailing dot). Hostnames are often used with network client and server programs, which must generally translate the name to an address for use. (This task is usually performed by the library routine When NIS or the host table is being used for hostname resolution, the hostname is looked up without modification. When DNS is used, the resolver may append domains to the hostname. The default method for resolving hostnames by the Internet name resolver is to follow security recommendations. Actions can be taken by the administrator to override these recommendations and to have the resolver behave the same as earlier, non-RFC 1535 compliant resolvers. The default method (using RFC 1535 guidelines) follows: If the name consists of a single component, i.e. contains no dot, and if the environment variable is set to the name of a file, that file is searched for a string matching the input hostname. The file should consist of lines made up of two strings separated by white-space, the first of which is the hostname alias, and the second of which is the complete hostname to be substituted for that alias. If a case- insensitive match is found between the hostname to be resolved and the first field of a line in the file, the substituted name is looked up with no further processing. If there is at least one dot in the name, then the name is first tried as is. The number of dots to cause this action is configurable by setting the threshold using the option in (default: If the name ends with a dot, the trailing dot is removed, and the remaining name is looked up (regardless of the setting of the 'ndots' option) and no further processing is done. If the input name does not end with a trailing dot, it is looked up by searching through a list of domains until a match is found. If nei- ther the search option in the file or the environment variable is used, then the search list of domains contains only the full domain spec- ified by the domain option (in or the domain used in the local hostname (see resolver(4)). For example, if the option is set to CS.Berke- ley.EDU, then only CS.Berkeley.EDU will be in the search list and will be the only domain appended to the partial hostname, lithium, making the only name to be tried using the search list. If the search option is used in or the environment variable, is set by the user, then the search list will include what is set by these methods. For example, if the option contained then the partial hostname (e.g., lithium) will be tried with each domain name appended (in the same order specified). The resulting host- names that would be tried are: The environment variable overrides the and options, and if both options are present in the resolver configuration file, then only the last one listed is used (see resolver(4)). If the name was not previously tried ``as is'' (i.e., it fell below the threshold or did not contain a dot), then the name, as originally provided, is attempted. AUTHOR
was developed by the University of California, Berkeley. SEE ALSO
named(1M), gethostbyname(3N), gethostent(3N), resolver(4), RFC 1535. hostname(5)
All times are GMT -4. The time now is 07:18 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy