Solved

A lot of people are trying to access my computer

Posted on 2004-10-29
119 Views
Last Modified: 2010-04-09
I think...
Just installed Zone Alarm Pro, and these things are coming through a mile a minute. I have an always-on broadband connection.

Can someone tell me what they are?
http://www.pdgmedia.com/zone.gif

Thanks,
Sean
0
Question by:seanpowell
    6 Comments
     
    LVL 49

    Expert Comment

    by:sunray_2003
    Sean,

    Is this your home or office network.. Looks to me those incoming  IP addresses are very near to your network..
    Have you tried to clear the logs and see if they come and fill it up soon..

    Possibly the network around you might have some virus or some hackers trying to scan for open ports ..

    SR..
    0
     
    LVL 36

    Expert Comment

    by:grblades
    Hi seanpowell,
    My guess is that you are being scanned by computers infected with the Blaster worm.

    See http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

    It is being blocked which is the main thing.
    0
     
    LVL 49

    Accepted Solution

    by:
    0
     
    LVL 31

    Author Comment

    by:seanpowell
    Thanks - lots to read...

    >>Is this your home or office network
    No network, just a single PC.

    Sean
    0
     
    LVL 31

    Author Comment

    by:seanpowell
    Thanks Sunray - further research confirms that this is harmless and (apparently) to be exepcted...

    Sean
    0
     
    LVL 49

    Expert Comment

    by:sunray_2003
    Super,Sean
    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
    Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
    This video Micro Tutorial is the first in a two-part series that shows how to create and use custom scanning profiles in Nuance's PaperPort 14.5 (http://www.experts-exchange.com/articles/17490/). But the ability to create custom scanning profiles al…
    how to add IIS SMTP to handle application/Scanner relays into office 365.

    933 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now