Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

track down network traffic

Posted on 2011-03-07
2
Medium Priority
?
564 Views
Last Modified: 2012-05-11
Hi,
     I have noticed as of late some pretty slow internet tmes. I set up netflow and i can see device pairs and bandwidth usage. So for example i am seeing a184-85-240-74.deploy.akamaitechnologies.com that is connecting with anywhere from 1 to 100 of my pc's at any given time. I know what akamaitechnologies.com is but dont know who or what is using it to connect to me.

I do know it is not windows updates because we use internal WSUS.
I do know it is not my A/V updateing because again we use internal Kaspersky server and i did call them and they said it is not them.
I do know it is using port 80 tcp

My first thought is to install wireshark and see if that helps. My problem is that i am not a wireshark person so not sure if it is right tool.

Any ideas? I can by all means block the XXX.deploy.akamaitechnologies.com but that is a bandaid, i want to know what is going on.
0
Comment
Question by:tkthelpdesk
2 Comments
 
LVL 84

Accepted Solution

by:
Dave Baldwin earned 200 total points
ID: 35059673
According to this page http://en.wikipedia.org/wiki/Akamai_Technologies , customers include Apple, Facebook, AMD, Amazon.com, Adobe Systems, J. C. Penney, Yahoo! and Blizzard Entertainment.  I would look at the major web sites and applications your people are using.
0
 

Author Closing Comment

by:tkthelpdesk
ID: 35083193
After further review it seems that there is alot of streeming video from these guys. Ratheer than block it at this point i have chosen to tighten up my internet access list and blocked people form Face book and shopping sites.

Thanks for the responce
0

Featured Post

WatchGuard Case Study: NCR

With business operations for thousands of customers largely depending on the internal systems they support, NCR can’t afford to waste time or money on security products that are anything less than exceptional. That’s why they chose WatchGuard.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Suggested Courses

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question