Dst IP are only few so I've added them to a list and added firewall rule in forward, output and Mangle - Postrouting chain , trying to catch which LAN IP is doing this
Code: Select all
/ip firewall filter add action=add-src-to-address-list address-list=MalwareLAN_IP address-list-timeout=none-dynamic chain=forward dst-address-list=Malware log=yes log-prefix=***Malware_LAN_IP_Forward**
/ip firewall mangle
add action=add-src-to-address-list address-list="Malware " address-list-timeout=none-dynamic chain=postrouting dst-address-list=Malware log=yes log-prefix=***Melware_Postrouting***
log attached
Code: Select all
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (SYN), myPublicIP:59285->13.248.148.254:80, len 60
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK,PSH), myPublicIP:59285->13.248.148.254:80, len 456
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK,PSH), myPublicIP:59285->13.248.148.254:80, len 398
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:13:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK), myPublicIP:59285->13.248.148.254:80, len 52
09:14:34 firewall,info ***MalwareIP output: in:(unknown 0) out:sfp-sfpplus1, proto TCP (ACK,FIN), myPublicIP:59285->13.248.148.254:80, len 52
there are no proxy, socks service.
I don't think the router is hacked.
only reason the Mikrotik originate a connection is Mikrotik's own DDNS service in Clud, and a SNTP client
we used to have few VPN client using this Mikrotik as a VPN server but I would think anything from these VPN clients would show up in forward Chain?
any thoughts?