Loading...
[get complete service list]
Port Information
Protocol Service Name
udp win-rpc Windows RPC
tcp cap Calendar Access Protocol,[Doug_Royer],[Doug_Royer],2010-12-09,,,,,
udp cap Calendar Access Protocol,[Doug_Royer],[Doug_Royer],2010-12-09,,,,,
tcp nterm remote_login network_terminal
Top IPs Scanning
Today Yesterday
93.123.39.87 (64)18.222.77.227 (470)
91.240.118.135 (43)91.191.209.166 (70)
69.164.214.243 (40)79.124.62.86 (55)
91.191.209.166 (34)176.113.115.215 (34)
112.120.119.231 (17)104.152.52.128 (21)
50.116.59.19 (15)95.168.116.5 (19)
176.113.115.215 (13)38.110.46.254 (14)
38.110.46.254 (10)199.45.154.49 (14)
205.210.31.248 (8)93.123.39.87 (12)
64.39.106.86 (8)106.75.134.86 (11)
Port diary mentions
URL
Port 1026-1031 increase
Nachia Decline; Increased Activity on Port 1026
Beagle Exploit, SSL NULL encryption (update), port 12345 and 1026
User Comments
Submitted By Date
Comment
alerter 2009-10-04 18:45:22
  The vast majority of these probes on UDP 1026, post-MS-RPC-DCOM exploit ("MS Blaster"), are Windows Messaging Service using alternate ports (UDP 1025-1027) to transmit/blast WMS Desktop Pop-up SPAM. This is because several ISP-s have blocked and/or continue to block UDP 135 post-MS-Blaster. A few offensive and ongoing UDP 1026 WMS SPAMmer source IP-s are: 203.197.199.183 (VSNL-IN), 61.143.182.138 (CHINANET-GD), 200.210.170.10 (LACNIC-ARIN BR), 202.131.221.61 (EAGLE-CN), whose respective ISP-s have been entirely unresponsive and unreactive to ongoing net abuse complaints (check incidents logged with DeepSight Security Analyzer and DShield).
2009-10-04 18:45:22
I wonder if it is related to "new attack vectors for rpc vulnerabilities" http://www2.corest.com/common/showdoc.php?idx=393&;;idxseccion=10
Ken Hollis 2004-01-30 19:53:56
UDP Port 1026 (And as AFAIK ports 1027, 1028 and 1029) are the ports for Windows Messenger Popup Spam. See: http://www.lurhq.com/popup_spam.html
Ken Hollis 2003-12-23 21:09:04
Greetings and Salutations: Since this is UDP, the spammers forge the source IP address to some unsuspecting party. Do not trust the source address, the packets would have to be traced hop by hop to actually find the perpetrator. Ken
CVE Links
CVE # Description