You could just deny all packets destined for 255.255.255.255 ipchains -A input -j DENY -d 255.255.255.255 -i eth1 I'm not completely familiar with what exactly what the 255.255.255.255 ip is for (Broadcast address???) Need to pick me up the TCP/IP book. Try to reverse DNS the source addresses to see if that helps give you any information about them. > David Demland wrote: > > I have now got a big part of my log file problems taken care of, I hope. Since > I was getting many DENY from just a few common IP I spent time trying to see > what was in common so I could remove so many logs from these IPs. This is what > I found: > > 1. - There were four common IPs: 200.*.*.*, 24.*.*.*, 169.*.*.*, and 10.*.*.*. > All four of these had one thing in common, the return IP. This was > 255.255.255.255. I thought that the return IP was nothing more than a mask. So > I added a deny line for each IP that look like: > > ipchains -A input -j DENY -s 200.0.0.0/8 -d 255.255.255.255 - eth1 > > This has seemed to removed so many entries in my log file. Could this be a > problem later on? > > 2. - Now that I have been able to "clean up" my log file I have been able to > see the following in the log: > > > Jul 20 18:25:21 localhost kernel: Packet log: input DENY eth1 PROTO=17 > 24.1.224.10:121 24.1.231.255:121 L=50 S=0x00 I=46385 F=0x0000 T=30 (#39) > > In this case the source IP and the destination IP seem to be valid. Any ideas > on what I should do? I know that these IPs are on the Cox network so does this > mean that Cox is checking on something or someone on the Cox network is > looking for something? > > > > 3. - There are now a couple of IPs that have the return IP of 255.255.255.255 > that I did not notice before. Should I do the same with each of these IPs or > not? > > > > Thank You, > > > > David Demland