Network Security

Posted on 2012-08-16
Last Modified: 2012-08-16
I work in a hotel. One of our guests stayed with us for a couple of days. After they had checked out, they mailed us dissapointed questioning the network security. They copied to us a message they claim they received from their Google acount; I havent experienced this before as no other guest has ever complained of such. the IP thats showing below is actually our external IP.I however dont understand;is this legit or fake message?could there be a security issue with this?Something we should do on our firewall?

''Someone recently tried to sign in to your Google Account, We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt:
May 9, 2012 12:28pm GMT
IP Address:
Location: blablabla, blablabla
If you do not recognize this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately. Find out how at''
Question by:LiloT
    LVL 6

    Accepted Solution

    My guess would be that...

    He was logged in to Gmal using your WiFi and that Gmail thought it was a hack attempt from this location (probably because it is geographically away from the other places they last logged in on)

    Hope this helps.

    I wouldnt worry..
    LVL 13

    Assisted Solution


    It's just that he tried logging into his Gmail account, but provided the wrong password.
    Because he hadn't logged into his account, with your public IP (geographical location).

    Google thinks that's a hack attempt. It's just a failsave, nothing to worry about. I get it all the time when I'm at a client and using the wrong password to my gmail.

    Author Comment

    I really appreciate your responses. Do you have links from google that have such info which i can use as facts to respond to our angry guest?something especially from google itself to support my facts?:-)
    LVL 13

    Expert Comment


    Author Comment

    You are the best!! Thank you!!
    Help on point!! :-)
    You saved me boss needed an explanation.
    I like Experts Exchange!!
    LVL 13

    Expert Comment

    Hehe. You're welcome.
    If you got any other questions, just shoot it to us.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
    Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    23 Experts available now in Live!

    Get 1:1 Help Now