从新的重新引导中,我在终端外壳中输入了netstat -an | more,并从netstat的输出中找到了一个通过端口443连接到我的系统的外部ip地址99.86.32.24。我选择了不把诊断报告发送到常规遥测服务器,但是我却连接到cannonical和amazon,为什么?
以下是作为参数传递的amazon的whois命令的输出:
NetRange: 99.85.128.0 - 99.87.191.255
CIDR: 99.85.128.0/17, 99.87.128.0/18, 99.86.0.0/16, 99.87.0.0/17
NetName: AMAZO-4
NetHandle: NET-99-85-128-0-1
Parent: NET99 (NET-99-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509
Organization: Amazon.com, Inc. (AMAZO-4)
RegDate: 2018-01-10
Updated: 2018-01-11
Ref: https://rdap.arin.net/registry/ip/99.85.128.0
OrgName: Amazon.com, Inc.
OrgId: AMAZO-4
Address: Amazon Web Services, Inc.
Address: P.O. Box 81226
City: Seattle
StateProv: WA
PostalCode: 98108-1226
Country: US
RegDate: 2005-09-29
Updated: 2020-04-07
Comment: For details of this service please see
Comment: http://ec2.amazonaws.com
Ref: https://rdap.arin.net/registry/entity/AMAZO-4
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-266-4064
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-266-4064
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: ADR29-ARIN
OrgRoutingName: AWS Dogfish Routing
OrgRoutingPhone: +1-206-266-4064
OrgRoutingEmail: aws-dogfish-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ADR29-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-266-4064
OrgAbuseEmail: abuse@amazonaws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-266-4064
OrgRoutingEmail: aws-routing-poc@amazon.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN我在这里的总体问题是,如果我从发送遥测数据中选择退出,为什么ubuntu会连接到其他远程服务器?这/这些联系有什么原因吗?还是我应该有妄想症?
发布于 2020-08-03 11:21:28
规范托管了AWS中的一些内容和更新镜像。这可能就是你在这里看到的所有东西。
发布于 2020-06-15 03:09:15
既然你问,就我个人而言,我会疑神疑鬼,用iptable来阻止它,并注意它的再现。当然,如果它影响到运行您的系统所需的任何服务,请注意。如果是的话,请在这里报告。现在,如果你不是偏执狂,你就是疯了。
使用上述说明中的提示确定哪些应用程序涉及到在您的调查中开始。
事实上,我在搜索“狗鱼路由”时发现了这个问题,因为我发现了另一个包含相同字符串的网卡54.64.0.0/13的可疑流量。
https://askubuntu.com/questions/1230546
复制相似问题