Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?
The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.
Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following IP addresses and server names:
• VBLADEAF001 126.96.36.199 (scan1.ws.symantec.com)
• VBLADEAF002 188.8.131.52 (scan2.ws.symantec.com)
• VBLADEAF003 184.108.40.206 (scan3.ws.symantec.com)
• VBLADEAF004 220.127.116.11 (scan4.ws.symantec.com)
• VBLADEAF005 18.104.22.168 (scan5.ws.symantec.com)
• VBLADEAF006 22.214.171.124 (scan6.ws.symantec.com)
• VBLADEAF007 126.96.36.199 (scan7.ws.symantec.com)
• VBLADEAF008 188.8.131.52 (scan8.ws.symantec.com)
• VBLADEAF009 184.108.40.206 (scan9.ws.symantec.com)
• VBLADEAF010 220.127.116.11 (scan10.ws.symantec.com)