?
Solved

Firewall report

Posted on 2016-07-26
4
Medium Priority
?
45 Views
Last Modified: 2016-08-22
Hi I have noticed this on my firewall

Capture.JPG

I checked in virus total and this IP seems clean

Should I worry?

thank you
Mirek
0
Comment
Question by:yodaa
  • 2
4 Comments
 
LVL 16

Expert Comment

by:dhsindy Sparrow
ID: 41729719
Check this link.  I think that 196.168.1.1 has something to do with starting your router.

  http://192-168-1-1admin.com/
0
 

Author Comment

by:yodaa
ID: 41729737
hmm?

No my firewall blocked this Trojan
0
 
LVL 14

Accepted Solution

by:
SIM50 earned 2000 total points (awarded by participants)
ID: 41729786
I would guess that a user (192.168.x.x) was browsing Internet, maybe not a very reputable site, and a site tried to download a trojan.  I would probably talk to that user and/or check his/her browsing history because there is always a chance that firewall will not be able to detect it.
0
 
LVL 14

Expert Comment

by:SIM50
ID: 41755356
The remote server tried to download the trojan to a user's computer.
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question