Страница 1 из 1

Abuse udp:111

Добавлено: Ср окт 29, 2025 6:52 pm
ahouse
Получил сегодня абузу.
Dear Sir or Madam,

the Portmapper service (portmap, rpcbind) is required for mapping RPC
requests to a network service. The Portmapper service is needed e.g.
for mounting network shares using the Network File System (NFS).
The Portmapper service runs on port 111 tcp/udp.

In addition to being abused for DDoS reflection attacks, the
Portmapper service can be used by attackers to obtain information
on the target network like available RPC services or network shares.

Over the past months, systems responding to Portmapper requests from
anywhere on the Internet have been increasingly abused DDoS reflection
attacks against third parties.

Please find below a list of affected systems hosted on your network.
The timestamp (timezone UTC) indicates when the openly accessible
Portmapper service was identified.

We would like to ask you to check this issue and take appropriate
steps to secure the Portmapper services on the affected systems or
notify your customers accordingly.

If you have recently solved the issue but received this notification
again, please note the timestamp included below. You should not
receive any further notifications with timestamps after the issue
has been solved.
Для чего Брейни использует для своих нужд 111 порт? кто на нем ?

висит на 0.0.0.0/0 !!

Код: Выделить всё

sudo systemctl stop rpcbind.socket
sudo systemctl stop rpcbind.service
sudo systemctl disable rpcbind.socket
sudo systemctl disable rpcbind.service

Re: Abuse udp:111

Добавлено: Чт окт 30, 2025 8:46 am
sbury
Порт 111 закрыт в панеле по умолчанию для внешнего доступа.
Покажите вывод

Код: Выделить всё

iptables -L -n | grep dpt:111
Проверить что на нем можно командами

Код: Выделить всё

rpcinfo -p 127.0.0.1
showmount -e 127.0.0.1
Возможно придется установить пакет showmount