Hey i got the same thing
05/09/2020-10:49:27.386401 [**] [1:2017919:2] ET DOS Possible NTP DDoS Inbound Frequent Un-Authed MON_LIST Requests IMPL 0x03 [**] [Classification: Attempted Denial of Service] [Priority: 2] {UDP} 193.228.91.107:37993 -> XX.XX.XX.XX:123
Sweet its all working now.
Ditto; I got one (.json and fast.log) last night:
{"timestamp":"1969-12-31T19:00:00.002026-0500","flow_id":1630532794320874,"in_iface":"eth0","event_type":"alert","src_ip":"193.228.91.106","src_port":42708,"dest_ip":"xx.xxx.xx.xx","dest_port":123,"proto":"UDP","alert":{"action":"allowed","gid":1,"signature_id":2017919,"rev":2,"signature":"ET DOS Possible NTP DDoS Inbound Frequent Un-Authed MON_LIST Requests IMPL 0x03","category":"Attempted Denial of Service","severity":2,"metadata":{"updated_at":["2014_01_02"],"created_at":["2014_01_02"]}},"app_proto":"failed","flow":{"pkts_toserver":1,"pkts_toclient":0,"bytes_toserver":234,"bytes_toclient":0,"start":"1969-12-31T19:00:00.002026-0500"}}
The recent, multiple sources of this thing seem consistent with earlier speculation about an old Trojan:
https://www.snbforums.com/threads/suricata-ids-ips-on-asuswrt-merlin.63280/page-5#post-580324
IIUC, this probe was NOT blocked
("action":"allowed")
https://suricata.readthedocs.io/en/latest/output/eve/eve-json-format.html
To block it would require the rule to use "drop"
action and
Suricata to be configured in the IPS mode
.
Nifty Stuff! 