Bitcoin Forum
May 21, 2024, 12:48:33 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Monitoring IP connections to Antminer S9, showing connection to pool AND another  (Read 123 times)
AESyn (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 7


View Profile
November 01, 2019, 03:17:14 PM
Last edit: November 02, 2019, 02:55:14 AM by frodocooper
 #1

So when I check the firewall for traffic, I see that they all connect to the pool ip address. 172.65.195.45 port 3334 (nicehash), But occasionally I see some of my Antminer S9's connecting to some sort of other IP using port 123. And its not all of them. Only some, and sometimes it disappears. One of them was a legitimate NTP IP pool, but another IP was strange, when I put it in my browser, it asked for username and password.

Should I block it? Is there a reason why the S9's should need to connect to another IP address other than the pool? And the funny thing is, its UDP port 123 all the time, although thats used for NTP Network Time Protocol.

I've heard some people say that Antminer's can be DDOsed using NTP IP pools.

Any thoughts?
PassThePopcorn
Sr. Member
****
Offline Offline

Activity: 465
Merit: 309


View Profile
November 01, 2019, 03:27:32 PM
Last edit: November 02, 2019, 02:55:37 AM by frodocooper
 #2

The miner only needs to connect to the pool and in some cases the dns server, other than that if you feel there is a problem block it.
mikeywith
Legendary
*
Offline Offline

Activity: 2226
Merit: 6405


be constructive or S.T.F.U


View Profile
November 01, 2019, 04:57:32 PM
 #3


It is really hard to say , does your hashrate on the pool drop when the miner is communicating with the other IP address? also are you using any sort of modified firmware which may come with dev fees whereby it tries to hash on the dev's pool?

I would say the best thing would be to block all unknown destinations, one by one and check if block any of them will affect the hash rate reported on the pool. 

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
frodocooper
Sr. Member
****
Offline Offline

Activity: 351
Merit: 410


View Profile
November 02, 2019, 03:41:16 AM
Merited by mikeywith (1)
 #4

If you would like to find out more information about those IP addresses before deciding whether to block them, then I suggest performing reverse lookups of the IP addresses to see what domain names they are mapped to, if any, and then performing WHOIS lookups of the returned domain names to see if those IP addresses belong to any entity that you know and trust.

If you are using a *nix OS — e.g., macOS or any Linux distribution — open a terminal window and enter the following:

Code:
dig @2606:4700:4700::1111 -x [IP address] +dnssec +multiline

(Replace [IP address] with the IP address that you are looking up. The IPv6 address 2606:4700:4700::1111 points to Cloudflare's public DNS resolver. You may change it to an IPv4 or IPv6 address of any other public resolver or simply leave out the @ field to query your local system's DNS resolver.) This should return the domain name that is mapped to the IP address, if any.

Then, perform a WHOIS lookup of the returned domain name by entering the following into your terminal:

Code:
whois [domain name]

(Replace [domain name] with the domain name that you are looking up. You may instead use a web-based WHOIS lookup client if you wish.)

If the returned results are suspicious or unknown to you, then I recommend blocking those IP addresses.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!