I have a home network that I thought was pretty secure. It uses an old
Macintosh running the NAT program IPNetRouter. Sometimes I use the FTP
or web server function of IPNetRouter, but fortunately no one writes
viruses for old out–of-date Macs these days and I have never had
a problem. These are currently turned off.
I am upstairs running Windows XP with ZoneAlarm Pro (mostly to check
for anything I don’t know about going out). I was surprised to
find a few rare cases of ICMP packets coming in from the outside and
reaching my PC. Most of these were responses to pings initiated on my
end. This kind of makes sense I guess. I don’t know how long
IPNetRouter remembers where to route ping echos, but often if I ping a
known spammer in China I will get a series of pings back from several
different IP addresses over the next 10 minutes (most of them starting
with 66… unregistered). This stuff gets through IPNetRouter, but
is presumably harmless.
Here is the weird part. Today out of the blue I get a UDP packet on
port 1026 from a server in China. No previous ping attempt from me.
Port 1026 is apparently being used these days for popup messenger
spam. I checked ShieldsUp and I find that Port 1026 is closed. In fact
every port is closed , except for 131 – 136, which are shown as
“stealth”. And my messenger service on Windows XP is also
disabled/stopped. At this point I am tempted to turn it on, just to
see if a message actually appears.
Packet in question:
Source IP: 18.104.22.168:30111
Detination: 192.168.0.62:1026 (my local LAN address)
My question: how is this possible? Anyone have any idea how a spammer
in China could get through my NAT router and reach my PC like this?
Second question, any recommendations for a software program that runs
on PowerMac circa 1996 (OS 7. something) that would give me a log of
all port probes?