21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8085) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (9090) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8118) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8000)
21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8085) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (9090) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8118) .",Detected,No Action Required,Firewall - Activities 21/10/2009 9:27 AM,Info,"Unused port blocking has blocked communications. Inbound TCP connection from 123.134.95.199, local service Port (8000)
NIS will block the probes, they are just probing for open services that they can exploit, most probably running a port scan of the entire class C network to see what they can find to hack.
Looking at the Whois, the IP belongs to China Unicom Shandong Province Network, so don't expect any reply from them.
Do you have the NIS firewall set on the default settings with port stealthing turned on? If so, don't worry about it, ignore it.
It's a server in China scanning networks for open proxies, hence the ports which are being scanned repeatedly are 8085, 9090, 8080, 8800, 8000, 3128, which are all used for proxy servers of various types.
Definitely nothing to worry about, I reaffirm what I previously said....ignore it.
Even if they got through, those ports would be closed. No damage could be done. Only when a service has a port open and the listening service exploitable could there be trouble.