Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?
The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.
Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following IP addresses and server names:
• VBLADEAF001 188.8.131.52 (scan1.ws.symantec.com)
• VBLADEAF002 184.108.40.206 (scan2.ws.symantec.com)
• VBLADEAF003 220.127.116.11 (scan3.ws.symantec.com)
• VBLADEAF004 18.104.22.168 (scan4.ws.symantec.com)
• VBLADEAF005 22.214.171.124 (scan5.ws.symantec.com)
• VBLADEAF006 126.96.36.199 (scan6.ws.symantec.com)
• VBLADEAF007 188.8.131.52 (scan7.ws.symantec.com)
• VBLADEAF008 184.108.40.206 (scan8.ws.symantec.com)
• VBLADEAF009 220.127.116.11 (scan9.ws.symantec.com)
• VBLADEAF010 18.104.22.168 (scan10.ws.symantec.com)