TIL The FreeBSD kernel auto-tarpits (for want of a better word) portscans on your host as soon as they attempt to connect to a closed port. If you see the following in your logs, that’s what’s happening.

"kernel: Limiting closed port RST response from 3877 to 190 packets/sec”

Shodan - looking at you!

You can have more fun using blackhole in sysctl

https://man.freebsd.org/cgi/man.cgi?query=blackhole&sektion=4&manpath=freebsd-release-ports

None of this is a substitute for a firewall.

#FreeBSD #Unix #hosting #portscanners #portscan

blackhole(4)

#McKinnon always said that he could not download graphic files of #UFOs because they were too large
He only could see one partially
Since my connection was bad in late 90's,to get files I was interested in,first thing I learned was to do #FXP and move files between 24/7 fine wired multiple computers.
When I accessed a .mil,.gov or foreign university computer,I could only see certain folders:
the less important ones. Not to mention that some computers detected #PortScanners and #IPSweeps attacks
@nixCraft A lot of #portscanners like #PortAuthority will identify the version based off probing...