Unknown outbound connection attempts from RC3

Home Page Forums Network Management ZeroShell Unknown outbound connection attempts from RC3

This topic contains 0 replies, has 0 voices, and was last updated by  johnoathome 5 years, 12 months ago.

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author
    Posts
  • #43804

    johnoathome
    Member

    Hello All, I’ve run up a couple of instances of RC3 installed to hard disk under Virtualbox and it seems to work well.

    The Windows host has Malwarebytes installed and when Zeroshell is running I’m getting blocked outbound connections to a particular IP address (83.243.15.46). Malwarebytes seems to have this listed as a dangerous site.

    Connection is attempted on a number of different ports (log extract is below). This doesn’t appear to be legit Zonalarm traffic.

    Anyone have any idea what is going on here?

    Thanks
    John

    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57280, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57311, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57315, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57316, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57348, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57448, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57457, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57466, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57471, Process: virtualbox.exe)
    2013/12/18 17:34:22 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57478, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57625, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57626, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57627, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57628, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57629, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57630, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57631, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57632, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57700, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57701, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57702, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57703, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57704, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57705, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57706, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57707, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57764, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57769, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57770, Process: virtualbox.exe)
    2013/12/18 17:34:38 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57771, Process: virtualbox.exe)
    2013/12/18 17:34:46 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57831, Process: virtualbox.exe)
    2013/12/18 17:34:46 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57832, Process: virtualbox.exe)
    2013/12/18 17:34:46 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 57834, Process: virtualbox.exe)
    2013/12/18 17:34:46 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 61255, Process: virtualbox.exe)
    2013/12/18 17:34:54 +1000 T410S John IP-BLOCK 83.243.15.46 (Type: outgoing, Port: 61284, Process: virtualbox.exe)

    #53033

    johnoathome
    Member

    Sorry, I meant this doesn’t seem to be legit Zeroshell traffic 🙂

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.