Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?
The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.
Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following IP addresses and server names:
• VBLADEAF001 184.108.40.206 (scan1.ws.symantec.com)
• VBLADEAF002 220.127.116.11 (scan2.ws.symantec.com)
• VBLADEAF003 18.104.22.168 (scan3.ws.symantec.com)
• VBLADEAF004 22.214.171.124 (scan4.ws.symantec.com)
• VBLADEAF005 126.96.36.199 (scan5.ws.symantec.com)
• VBLADEAF006 188.8.131.52 (scan6.ws.symantec.com)
• VBLADEAF007 184.108.40.206 (scan7.ws.symantec.com)
• VBLADEAF008 220.127.116.11 (scan8.ws.symantec.com)
• VBLADEAF009 18.104.22.168 (scan9.ws.symantec.com)
• VBLADEAF010 22.214.171.124 (scan10.ws.symantec.com)