Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp ssc-agent Symantec System Center
udp ssc-agent Symantec System Center
Top IPs Scanning
Today Yesterday
77.221.148.156 (10)198.74.50.114 (69)
118.123.105.93 (6)143.42.164.204 (39)
118.123.105.89 (4)79.137.198.113 (20)
195.62.32.75 (3)77.221.148.156 (13)
194.180.49.176 (3)194.180.49.176 (10)
79.124.62.74 (2)83.222.190.122 (10)
70.62.28.200 (2)139.144.239.74 (10)
89.248.165.85 (2)222.186.13.133 (10)
222.186.13.133 (2)222.186.13.132 (5)
193.163.125.193 (1)83.222.190.106 (4)
Port diary mentions
URL
SAV Worm Update
Good Morning 2007
Significant increase in port 2967 traffic
User Comments
Submitted By Date
Comment
Joe Kluwecksinski 2009-10-04 18:45:22
Recent tcp 2967 traffic appears to be related to an IRC BOT mostly aimed at colleges, but others, too. This link gives a rather good explanation of the exploit http://asert.arbornetworks.com/2006/11/that-new-bot-irc-bot-attacking-symantec-overflow/ Helpful hints: Look in C/windows for w32svc.exe. That's a bad thing if you have it. Also, look in services for "Windows Network Firewall", another bad thing.
CJ 2008-04-29 18:23:10
Did anyone notice the heaviest target numbers on this port is nearly always around the 1st and the 15th?
2008-04-29 18:22:39
Exploits an overflow condition in Symantec AV Corp. Masquerades as msupdates.exe, nod33.exe and wauclt.exe. Bot also connects back to an IRC server on a non-standard port. Lives in %windir%\system32 and is set as hidden and read only. Makes many registry changes to the netbt hive under HKLM\System\CurrentControlSet\Services and to the HKLM\SOFTWARE\Microsoft\Windows run and OLE keys. Runs IP scans en mass to discover other hosts to infect.
CVE Links
CVE # Description