Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Firewall report

Posted on 2016-07-26
4
33 Views
Last Modified: 2016-08-22
Hi I have noticed this on my firewall

Capture.JPG

I checked in virus total and this IP seems clean

Should I worry?

thank you
Mirek
0
Comment
Question by:yodaa
  • 2
4 Comments
 
LVL 16

Expert Comment

by:dhsindy
ID: 41729719
Check this link.  I think that 196.168.1.1 has something to do with starting your router.

  http://192-168-1-1admin.com/
0
 

Author Comment

by:yodaa
ID: 41729737
hmm?

No my firewall blocked this Trojan
0
 
LVL 14

Accepted Solution

by:
SIM50 earned 500 total points (awarded by participants)
ID: 41729786
I would guess that a user (192.168.x.x) was browsing Internet, maybe not a very reputable site, and a site tried to download a trojan.  I would probably talk to that user and/or check his/her browsing history because there is always a chance that firewall will not be able to detect it.
0
 
LVL 14

Expert Comment

by:SIM50
ID: 41755356
The remote server tried to download the trojan to a user's computer.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question