Solved

track down network traffic

Posted on 2011-03-07
2
556 Views
Last Modified: 2012-05-11
Hi,
     I have noticed as of late some pretty slow internet tmes. I set up netflow and i can see device pairs and bandwidth usage. So for example i am seeing a184-85-240-74.deploy.akamaitechnologies.com that is connecting with anywhere from 1 to 100 of my pc's at any given time. I know what akamaitechnologies.com is but dont know who or what is using it to connect to me.

I do know it is not windows updates because we use internal WSUS.
I do know it is not my A/V updateing because again we use internal Kaspersky server and i did call them and they said it is not them.
I do know it is using port 80 tcp

My first thought is to install wireshark and see if that helps. My problem is that i am not a wireshark person so not sure if it is right tool.

Any ideas? I can by all means block the XXX.deploy.akamaitechnologies.com but that is a bandaid, i want to know what is going on.
0
Comment
Question by:tkthelpdesk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 50 total points
ID: 35059673
According to this page http://en.wikipedia.org/wiki/Akamai_Technologies , customers include Apple, Facebook, AMD, Amazon.com, Adobe Systems, J. C. Penney, Yahoo! and Blizzard Entertainment.  I would look at the major web sites and applications your people are using.
0
 

Author Closing Comment

by:tkthelpdesk
ID: 35083193
After further review it seems that there is alot of streeming video from these guys. Ratheer than block it at this point i have chosen to tighten up my internet access list and blocked people form Face book and shopping sites.

Thanks for the responce
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Read about achieving the basic levels of HRIS security in the workplace.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question