Solved

Firewall report

Posted on 2016-07-26
4
34 Views
Last Modified: 2016-08-22
Hi I have noticed this on my firewall

Capture.JPG

I checked in virus total and this IP seems clean

Should I worry?

thank you
Mirek
0
Comment
Question by:yodaa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 16

Expert Comment

by:dhsindy
ID: 41729719
Check this link.  I think that 196.168.1.1 has something to do with starting your router.

  http://192-168-1-1admin.com/
0
 

Author Comment

by:yodaa
ID: 41729737
hmm?

No my firewall blocked this Trojan
0
 
LVL 14

Accepted Solution

by:
SIM50 earned 500 total points (awarded by participants)
ID: 41729786
I would guess that a user (192.168.x.x) was browsing Internet, maybe not a very reputable site, and a site tried to download a trojan.  I would probably talk to that user and/or check his/her browsing history because there is always a chance that firewall will not be able to detect it.
0
 
LVL 14

Expert Comment

by:SIM50
ID: 41755356
The remote server tried to download the trojan to a user's computer.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cannot create a homegroup on my computer 7 36
VLAN Question 7 44
Internet browsers time-out but can ping and connect remotely 19 59
Rogue RDP Connections 5 63
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question