I’m using Mikrotik RouterOS 4.5 and recently received a number of complaints about malicious (scanning rdp service port) traffic originated from one of IP addresses on my router.
I enabled logging to monitor origin of this traffic and received this:
05:22:34 firewall,info rdp_out output: in:(none) out:ether1-gw-RCom, proto TCP (RST), my_ip:18543->some_random_ip:3389, len 20
05:22:36 firewall,info rdp_out output: in:(none) out:ether1-gw-RCom, proto TCP (RST), my_ip:18543->some_random_ip:3389, len 20
06:03:31 firewall,info rdp_out output: in:(none) out:ether1-gw-RCom, proto TCP (RST), my_ip:62990->some_random_ip:3389, len 20
06:11:56 firewall,info rdp_out output: in:(none) out:ether1-gw-RCom, proto TCP (RST), my_ip:19555->some_random_ip:3389, len 20
According to manual, output chain is for traffic that originates from router itself. Could it be that my router was hacked and what is my course of action if it was?
P.S. I never used default passwords and all service ports was remapped to custom number, except winbox.