Solved

A user’s machine is being chatty with IP

Posted on 2014-04-30
3
233 Views
Last Modified: 2014-05-08
A user’s machine is being chatty with IP 199.27.105.111., it looks like this IP is associated with rgbcolo.rgbnetworks.com,  or www.layer42.net  or possibly  amazon cloud player. Any thoughts would be great.
Thanks folks
0
Comment
Question by:kennethjk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 96

Accepted Solution

by:
Experienced Member earned 500 total points
ID: 40031941
I suggest you get a copy of Wireshark. Put it on a machine on the same subnet as the problem machine. See if you can see in the packets:

1. Excessive packets.
2. Undesirable traffic in the packets. You should be able to see packet contents. I use CommView for this.

It is a very detailed analysis and not always fruitful.

If the site is not in compliance with your company guidelines, have the employee's manager discuss the issue and ask the employee to stop.
0
 

Author Closing Comment

by:kennethjk
ID: 40049861
Thank you so much
0
 
LVL 96

Expert Comment

by:Experienced Member
ID: 40050260
@kennethjk  - You are most welcome and I was happy to help.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question