Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?
The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.
Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following IP addresses and server names:
• VBLADEAF001 220.127.116.11 (scan1.ws.symantec.com)
• VBLADEAF002 18.104.22.168 (scan2.ws.symantec.com)
• VBLADEAF003 22.214.171.124 (scan3.ws.symantec.com)
• VBLADEAF004 126.96.36.199 (scan4.ws.symantec.com)
• VBLADEAF005 188.8.131.52 (scan5.ws.symantec.com)
• VBLADEAF006 184.108.40.206 (scan6.ws.symantec.com)
• VBLADEAF007 220.127.116.11 (scan7.ws.symantec.com)
• VBLADEAF008 18.104.22.168 (scan8.ws.symantec.com)
• VBLADEAF009 22.214.171.124 (scan9.ws.symantec.com)
• VBLADEAF010 126.96.36.199 (scan10.ws.symantec.com)