die Sache ist die, jeder kann deine IP just for fun nach offen ports scannen
http://nmap.org/zenmap/
224.0.0.1 The All Hosts multicast group addresses all hosts on the same network segment. - lokale IP
169.254.x.x - lokale IP ( wenn dein PC keien DHCP Server findet, und sich eine IP selber gibt)
wobei port 19 komisch ist:
http://www.speedguide.net/port.php?port=19
https://www.rfc-editor.org/rfc/rfc864.txt
https://isc.sans.edu/diary/A+Chargen-based+DDoS?+Chargen+is+still+a+thing?/15647
TCP Based Character Generator Service
One character generator service is defined as a connection based
application on TCP. A server listens for TCP connections on TCP port
19. Once a connection is established a stream of data is sent out
the connection (and any data received is thrown away). This
continues until the calling user terminates the connection.
It is fairly likely that users of this service will abruptly decide
that they have had enough and abort the TCP connection, instead of
carefully closing it. The service should be prepared for either the
carfull close or the rude abort.
The data flow over the connection is limited by the normal TCP flow
control mechanisms, so there is no concern about the service sending
data faster than the user can process it.
UDP Based Character Generator Service
Another character generator service is defined as a datagram based
application on UDP. A server listens for UDP datagrams on UDP port
19. When a datagram is received, an answering datagram is sent
containing a random number (between 0 and 512) of characters (the
data in the received datagram is ignored).
There is no history or state information associated with the UDP
version of this service, so there is no continuity of data from one
answering datagram to another.
The service only send one datagram in response to each received
datagram, so there is no concern about the service sending data
faster than the user can process it.
---------------------
Smurf attack
From Wikipedia, the free encyclopedia
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. Most devices on a network will, by default, respond to this by sending a reply to the source IP address. If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooded with traffic. This can slow down the victim's computer to the point where it becomes impossible to work on.
solange dass nicht sehr sehr oft auftaucht, kann eingetlich nichts passieren.
ich würde mir keine Sorgen machen
_------------
Könntest du deine IP nach offen Ports Scannen ?