Why does my pc make so many connections?
from Clark@lemmy.ml to privacy@lemmy.ml on 03 Sep 15:56
https://lemmy.ml/post/35624422

Hello all,

According to the Wireshark record my computer connects to various services often, including Amazon, Hetzner, 1337 Services GmbH, Evanzo GmbH and ThomasFamilyInvestments. The most often were the connections to mail.my-mail.rocks which is a part of Netcup GmbH. I have a somewhat minimal distro and the attached recordings were made when no app was open including no browser. I can send the other screenshots showing other connections too. I’m suspecting of malware since some time ago but can you help me clarify these connections please?

#privacy

threaded - newest

anon5621@lemmy.ml on 03 Sep 16:02 next collapse

Just open sudo ss -tulpn u will see all programs with opened port and u will killing disabling until u will find source of network noise

nitrolife@rekabu.ru on 03 Sep 16:29 collapse

But without “l”. This connections created as client I think:

ss -tupn

Clark@lemmy.ml on 03 Sep 16:57 collapse

i only have these over long term but brave was closed when recording:

Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port Process
udp ESTAB 0 0 192.168.1.100%wlan0:68 192.168.1.1:67 users:((“NetworkManager”,pid=1065,fd=27))
tcp ESTAB 0 0 192.168.1.100:57728 185.246.86.175:9001 users:((“tor”,pid=1143,fd=16))
tcp ESTAB 0 0 192.168.1.100:60406 54.36.178.108:443 users:((“brave”,pid=5153,fd=27))
tcp ESTAB 0 0 192.168.1.100:40606 89.58.56.112:587 users:((“tor”,pid=1143,fd=12))

nitrolife@rekabu.ru on 03 Sep 17:15 collapse

If you are receiving data from tor, then you are most likely seeing these connections. They also change over time, so tor relay nodes change and can be located anywhere.

In addition, in the example you have port 9001, which means that relaying is most likely enabled in your client and you are a relay for other participants. Check the settings of the tor (relay/bridge).

Clark@lemmy.ml on 03 Sep 18:11 next collapse

Thanks for the informations. This clarifies a lot.

melroy@kbin.melroy.org on 03 Sep 20:45 collapse

Also it seems that your browser is still active on your computer called brave?

Clark@lemmy.ml on 03 Sep 22:19 collapse

No, it wasn’t at the time of recording. It was a confirmation later on that tor and network manager were the only apps using the ports with brave opened.

MangoPenguin@lemmy.blahaj.zone on 03 Sep 16:04 next collapse

Do you have any apps open in the foreground or background while doing the packet capture? Check with top or htop and make sure all your apps are truly closed.

Amazon, Hetzner, and the others are VPS providers among other services, so seeing connections to those by apps could be fairly normal as they often check for updates or download supporting items to make the app work.

Clark@lemmy.ml on 03 Sep 18:13 next collapse

Thank you for the informations. There were nothing in the foreground but tor was apparently running in the background. But I’m still not sure if these services were all due to Tor. I need to run another record I guess

eldavi@lemmy.ml on 03 Sep 19:17 next collapse

it sounds like you’ll need a better handle on what’s running on your computer.

if this matters to you enough: you can start with pruning the systemd services that are running to remove the ones you don’t want so that you can know for certain what is supposed to be running and then run another capture to see where it’s calling out to.

MangoPenguin@lemmy.blahaj.zone on 03 Sep 20:45 next collapse

Tor creates a ton of connections to all kinds of places, so that might have been the source.

iglou@programming.dev on 03 Sep 22:54 next collapse

Per its nature, tor is definitely going to create a lot of noise in your capture. Shut it down and try again, see if you still have so many connections.

It is highly unlikely that you have malware that you can’t see, so if you still see them after shutting down tor, use tools that tell you which app has established connections.

rumba@lemmy.zip on 05 Sep 00:40 collapse

Yeah, * Tor. Its primary job is to make and destroy tons of connections to keep you private.

Edit: Still getting used to FUTO keyboard. It doesn’t need me to say comma

[deleted] on 03 Sep 22:53 collapse

.

habitualTartare@lemmy.world on 03 Sep 16:09 next collapse

That mail/[.]my-mail/[.]rocks maps to the tor network.

metrics.torproject.org/rs.html#details/E3F16EEB32…

Clark@lemmy.ml on 03 Sep 16:46 collapse

so am i running a relay in the background although tor browser is closed?

habitualTartare@lemmy.world on 03 Sep 19:12 collapse

If it’s like a vpn interface, it’s still running as a deamon in the background even if the browsers are closed.

Like others have said you can check what application is using each open port. You can also check running processes (ps | grep keywords) and interfaces (ip a).

stupid_asshole69@hexbear.net on 03 Sep 18:45 next collapse

That screenshot just looks like a computer (.100, is that you?) dialing the upstream device (a zyxel!), it doesn’t seem to show what the intended recipient is. If you’re running windows then the start menu ads do crazy stuff. Also I asked if that last local ip octet is you because wireshark will show you other computers traffic coming across its wireless interface.

From a high port to a low port makes me think it’s someone else on your network doing piracy.

Clark@lemmy.ml on 03 Sep 19:07 collapse

Yes, .100 is me. I have a Zyxel router, should it show the intended recipient? I’m running Linux. What do you mean by a high port to a low port? I also think there is a malware.

stupid_asshole69@hexbear.net on 03 Sep 20:20 collapse

If you think there’s malware then just wipe and reinstall.

If you wanna find out what the computer is connecting to, post the wireshark logs.

Amazon, hetzner and Evanzo are hosting providers, krebs seems to think 1337 services is a scammy site/company and thomas is a shell company. My-mail.rocks has some tor nodes.

melroy@kbin.melroy.org on 03 Sep 20:43 collapse

Exactly my point. Just share the actual wireshark log. You record a few seconds and then stop. And then share the log.

Clark@lemmy.ml on 03 Sep 22:52 collapse

I’m not just trying to get rid of the malware but also understand what it’s doing. Besides, wiping the system doesn’t help as some viruses can permanently corrupt bios. So before wiping out, I think it’s a good idea to know what’s going on my pc and where do my data go, if there is a malware. I’m a rookie with network monitoring, that’s why I’m trying to learn from more experienced users. Here is the part of the original capture: limewire.com/?referrer=pq7i8xx7p2. I will disable tor and close all apps along with some serviced and record again. I will let you know, thanks for your help

krolden@lemmy.ml on 03 Sep 23:09 next collapse

You will probably get better answers if you ask in a networking forum rather than u/privacy.

forum.level1techs.com

.

Clark@lemmy.ml on 03 Sep 23:11 collapse

The answers are good enough for me here

stupid_asshole69@hexbear.net on 04 Sep 00:21 collapse

I can’t see that link. Just drop the log in a paste bin or something.

You’re probably not in a position to figure out what the malware is doing, or even if you have malware running.

If you brought me your computer and said “I think I have malware and I want to understand what’s happening” I would remove the drive, image it using an appliance instead of a computer and put the image in a forensic environment so I could observe it safely.

Clark@lemmy.ml on 05 Sep 18:46 next collapse

I wish I could bring it to an expert. Do you know how to find one? Here is the file: paste.centos.org/view/5df16fbe Sorry for the delay

[deleted] on 05 Sep 19:02 collapse

.

krolden@lemmy.ml on 03 Sep 19:16 next collapse

Because you’re on the internet

Clark@lemmy.ml on 03 Sep 19:20 collapse

Does also your computer connect to Amazon, Hetzner, 1337 Services GmbH, Evanzo GmbH and ThomasFamilyInvestments without a reason?

krolden@lemmy.ml on 03 Sep 19:43 collapse

Everything has a reason

Fijxu@programming.dev on 03 Sep 19:52 next collapse

Use bandwhich to see which programs are using traffic ;)

Clark@lemmy.ml on 03 Sep 23:14 collapse

I will try it, thank you :)

infjarchninja@lemmy.ml on 03 Sep 22:35 next collapse

I find wireshark too confusing unless you have a lot of experience with it.

It looks like you are using linux because I see Wlan0 at the top of the image

I use ss

ss --help

to see what you are connecting to

ss -x -a

ss -o state established

ss -o state established ‘( dport = :http or sport = :http )’

what processes are using open sockets

ss -pl

TCP sockets

ss -t -a

UDP sockets

ss -t -a

a deeper guide here:

cyberciti.biz/…/linux-investigate-sockets-network…

ki9@lemmy.gf4.pw on 04 Sep 15:39 next collapse

-u for udp in the last one.

int32@lemmy.dbzer0.com on 04 Sep 23:04 collapse

SS is a weird name but ok.

Revan343@lemmy.ca on 05 Sep 03:07 collapse

Socket shark, maybe? The 2 digit namespace is valuable enough that there was no way ss was going unused, nazi-association be damned

Zerush@lemmy.ml on 04 Sep 12:28 collapse

Use Portmaster

Harvey656@lemmy.world on 05 Sep 01:40 collapse

This is the way

Zerush@lemmy.ml on 05 Sep 11:06 collapse

Portmaster is mandatory nowadays, like also InviZible Pro in Android

Harvey656@lemmy.world on 05 Sep 12:16 collapse

Oooooo I haven’t seen that one before, thanks!