I got this email from my ISP in Germany. I don’t know what to do about it, or where to ask on Lemmy (all the tech communities seem to be about news and info, not to ask any questions)

I have two phones (Xiaomi and Poco), two iPads, two Devolo repeaters, one Tenda repeater, a PC and and Android TV Box… I suspect it may be the Android box I think it is rooted and I will put AFWall+ on it when I get home.

I haven’t yet been able to check the IP address that they sent. But does anyone know if these emails are legit, and what to do about them if they are? I will obviously have to try and find the culprit and try to clean it, but the IP addresses look different on my router (192.168.XXX.XXX)

Can anyone help? What to do?

This is an automated abuse complaint regarding suspection of device infection within your network behind IP address 210.XXX.XXX.XXX

Our isolated systems has received multiple unsolicited incoming connections from an IP address under your control (abuse-mailbox as per RIR database). All unsolicited connections reported below have completed three-way handshake procedure defined per Transmission Control Protocol (TCP). This ensures that our evidence was not tampered upon any external party posessing a source IP address spoofing capability, because three-way handshake procedure requires both receiving (device within our network) and sending (device within your network) parties to receive reply of another party to complete handshake.

The aforementioned isolated systems within our network are hosted at unused IP address space and are implemented as a TCP listener, so that we can be sure our evidence actually covering “unsolicited” and “not spoofed” activity.

The activity we are reporting is often referred to as “service probing” or “banner grabbing”. Unlike typical “port scan” type of abuse complaints you might receive, our complaints are not induced by a single or multiple TCP packets with SYN flag set. Instead, as was mentioned previously, three-way handshake procedure is required. To eliminate possible false-positive alerts caused by human typo, abuse complaint is generated only upon having four (4) distinct successful connections as per (Source IP; Destination IP; Destination Port) tuple.

To minimize “Internet background noise” our network observes, the reported IP address was temporarily banned. Do not worry, it will be unblocked automatically soon. If it is the first report for this IP address within 90 days, block lasts 24 hours. Each following report within this timeframe extends blocking duration for 24 hours.

As for implications for your network, we suspect that device within your network is infected with a malware. However, sometimes there are another reasons, namely:

  • device hosts publicly accessible proxy or VPN (either intentionally, due to   software misconfiguration or due to usage of “proxyware” type of software);
  • device is infected with a malware (for example, networking worm, most frequently   this happens with IoT and DVR/IP cameras);
  • device (for example, server) is used by an malicious actor for exploitation   purposes (see “unethical hacking”);
  • device is used by a legitimate Internet security researchers team that can be   clearly attributed using Forward-confirmed reverse DNS (FCrDNS).

Given exact reason in this situation, you would like either to communicate with your client to address this issue as per Terms of Service of your organization or notify us of legitimate nature of this activity. When it comes to legitimate security researchers, we are always co-operating to whitelist your networks as long as FCrDNS is valid.

Please note that we are providing hosting services, hence you are strongly discouraged from blocking any of the destination IP addresses mentioned below.

If these complaints are considered irrelevant by your team for any reason, do not hesitate to let us know by replying to this letter. We will exclude your abuse-mailbox from receiving these abuse complaints in the future.

Incident details are attached below. Please note that due to some automated abuse complaint processing systems parsing destination IP addresses as ones involved to this report, we are redacting destination IP addresses replacing all “.” and “:” characters with “x”.

Timestamp                SrcIP          SrcPort DstIP          DstPort
2026-05-04T10:31:16.818Z 210.XXX.XXX.XXX 64644   82x24x200x216  23
2026-05-04T12:46:08.422Z 210.XXX.XXX.XXX 65179   88x218x206x67  23
2026-05-04T13:58:24.048Z 210.XXX.XXX.XXX 64515   88x218x206x29  23
2026-05-04T19:36:57.453Z 210.XXX.XXX.XXX 61451   144x79x59x121  23
----------------------------------------------------------------------

As was mentioned previously, the table above lists all unsolicited TCP connections that have completed three-way handshake. This prevents us from producing false-positive alerts. It is worth to note that we aren’t closing the connection immediately after three-way handshake was completed, thus you should see communication from your sFlow monitoring. If you are using NetFlow or IPFIX, you should be able to see all four (4) flows. If you don’t implement any of those, do not hesitate to ask us for more detailed logs.

Kind regards, Network department Skhron

  • MalMen@masto.pt
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    19 hours ago

    @Babalugats ewe, that being true, isp is snifing your network…
    i know mine as full access to the router they provide, thats why I have my own router in front of it

    • Wildmimic@anarchist.nexus
      link
      fedilink
      Português
      arrow-up
      2
      ·
      18 hours ago

      Sorry, thats not correct. The ISP informed OP that a device from behind OPs public IP address attempted outgoing connections to ISP systems, not that the ISP sniffed network traffic.