Solved

Hacking Attempts

Posted on 2011-09-28
4
269 Views
Last Modified: 2012-05-12
For two weeks one of my clients has been getting
Audit Failures. I traced the ip and I think this attacker is spoofing his ip address. What can I do to stop this.
The attacker is searching various ports.After I reboot the server the attacker switches ip address's They are using a cisco 4000 router and I don't see a place where to block the ip's but it won't matter. Please help
0
Comment
Question by:jackm1
  • 2
  • 2
4 Comments
 
LVL 3

Expert Comment

by:pistanu
ID: 36815583
make a complaint at the owner of the ip, or the ISP.how do you know is a c4000?
0
 

Author Comment

by:jackm1
ID: 36815898
His ISP changes.
It's my client that gas tge Cisco 4000
0
 
LVL 3

Accepted Solution

by:
pistanu earned 500 total points
ID: 36890043
the the only chance is to change your ip, in case o spoof flood the isp filter the destination.
0
 

Author Closing Comment

by:jackm1
ID: 36921888
This helped

Thanks
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question