<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic tracing malware in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751002#M179161</link>
    <description>&lt;P&gt;I have been informed by my ISP that a botnet has been detected and the ip address is the Global PAT address. how do i trace the source ip?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:32:03 GMT</pubDate>
    <dc:creator>mickyq</dc:creator>
    <dc:date>2019-03-12T06:32:03Z</dc:date>
    <item>
      <title>tracing malware</title>
      <link>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751002#M179161</link>
      <description>&lt;P&gt;I have been informed by my ISP that a botnet has been detected and the ip address is the Global PAT address. how do i trace the source ip?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751002#M179161</guid>
      <dc:creator>mickyq</dc:creator>
      <dc:date>2019-03-12T06:32:03Z</dc:date>
    </item>
    <item>
      <title>Probably it's not possible</title>
      <link>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751003#M179162</link>
      <description>&lt;P&gt;Probably it's not possible any more. What do you need:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;An exact timestamp from the event and if possible the destination-address/port.&lt;/LI&gt;&lt;LI&gt;Your firewall-log showing which PC was communicating at that moment with the destination.&lt;/LI&gt;&lt;LI&gt;If you are using DHCP, you also need a DHCP-log to see which internal system was using that IP at that time.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Perhaps it's time to migrate to &lt;A href="http://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html"&gt;ASA with FirePOWER&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 12:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751003#M179162</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-09-02T12:29:52Z</dc:date>
    </item>
    <item>
      <title>Thanks KarstenI'll put that</title>
      <link>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751004#M179163</link>
      <description>&lt;P&gt;Thanks Karsten&lt;/P&gt;&lt;P&gt;I'll put that on my Christmas wish list &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 14:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracing-malware/m-p/2751004#M179163</guid>
      <dc:creator>mickyq</dc:creator>
      <dc:date>2015-09-02T14:59:52Z</dc:date>
    </item>
  </channel>
</rss>

