Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?
The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.
Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following IP addresses and server names:
• VBLADEAF001 22.214.171.124 (scan1.ws.symantec.com)
• VBLADEAF002 126.96.36.199 (scan2.ws.symantec.com)
• VBLADEAF003 188.8.131.52 (scan3.ws.symantec.com)
• VBLADEAF004 184.108.40.206 (scan4.ws.symantec.com)
• VBLADEAF005 220.127.116.11 (scan5.ws.symantec.com)
• VBLADEAF006 18.104.22.168 (scan6.ws.symantec.com)
• VBLADEAF007 22.214.171.124 (scan7.ws.symantec.com)
• VBLADEAF008 126.96.36.199 (scan8.ws.symantec.com)
• VBLADEAF009 188.8.131.52 (scan9.ws.symantec.com)
• VBLADEAF010 184.108.40.206 (scan10.ws.symantec.com)