Meilleur auteur de réponses
Length specified in network packet payload did not match number of bytes read; the connection has been closed.
Hello every one
I am getting this in my event log from time to time . not sure what is that ?
Is this a hacker trying to send rubbish data to SQL through the port ?
Any help is appreciated .
Length specified in network packet payload did not match number of bytes read; the connection has been closed. Please contact the vendor of the client library. [CLIENT: someip]
Toutes les réponses
Thank you all for the reply ,
my server is on port 1533 . Port 1433 is closed on my server .
All the requests are coming from my own ip , i feel this is funny .
Is my server hacked then ?
Or could be my ISP doing any routine tests ?
Also is this is hack attempt , what does this hacker think he will benefit from this ? Could this bring the SQL server down ?
I was thinking about chaning port to something else , 1344 or something , u think this can be better ?
corporate nessus scanners will cause this error when probing. It seems to perhaps cause a network hiccup sometimes too even on fully patched machines although, I never find any confirmation in nessus forums. The correlation in my logs is indisputable though.