Port 6502 is showing a significant increase in unwanted traffic:
The increase is almost purely TCP.
It seems possible this is related to the activity reported earlier by US-CERT regarding the CA BrightStor ARCserve Backup Tape Engine. It exploits a vulnerability disclosed on November 24th, 2006 for which there doesn't seem to be a patch available.
To be sure what it is, we'd like some packets. Please note we don't need just SYN packets, they are useless for this. We need you to set up something that listens and actively tries to talk as a server on port 6502. "nc" with the right options comes to mind (options are system dependent, check your man page).
It's interesting to note the length of time that passed on this one if this is indeed still the same vulnerability they are attempting to exploit.
Swa Frantzen -- Section 66