Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

A user’s machine is being chatty with IP

Posted on 2014-04-30
3
219 Views
Last Modified: 2014-05-08
A user’s machine is being chatty with IP 199.27.105.111., it looks like this IP is associated with rgbcolo.rgbnetworks.com,  or www.layer42.net  or possibly  amazon cloud player. Any thoughts would be great.
Thanks folks
0
Comment
Question by:kennethjk
  • 2
3 Comments
 
LVL 93

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40031941
I suggest you get a copy of Wireshark. Put it on a machine on the same subnet as the problem machine. See if you can see in the packets:

1. Excessive packets.
2. Undesirable traffic in the packets. You should be able to see packet contents. I use CommView for this.

It is a very detailed analysis and not always fruitful.

If the site is not in compliance with your company guidelines, have the employee's manager discuss the issue and ask the employee to stop.
0
 

Author Closing Comment

by:kennethjk
ID: 40049861
Thank you so much
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 40050260
@kennethjk  - You are most welcome and I was happy to help.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question