Sometime on Dec 29, kishor bhagwat assembled some asciibets to say:
this is a malicious attempt-not innocent at all!! hint:same destination and source ports...
Only in the case of SPT, DPT 22, 111. Others have seemingly random SPT
You've got connect attempts (SYN packets) on ports 21, 22, 25, 111 (ftp, ssh, smtp, portmapper/sunrpc).
My guess is that someone is looking to see if you (or anyone on the network (broadcast address)) have these services running. Can't tell if they're just probing for running services, of if they're actually looking for exploits. All I know is that all of the above have known vulnerabilities and exploits.
21 - wu-ftpd - buffer overflow gives root shell - fixed? 22 - openssh - buffer overflow gives root shell - fixed 25 - sendmail - loads of bugs - fixed 111 - portmapper - rpc, nfs - say no more
Philip