Security Router Working

Published:

Since we have implemented our Gigabit Security Router we can see the IP addresses of any Hack/Attack.

During this period we have noticed 2 heavy hitters, 118.123.5.105 and 124.235.106.127.

Now, DO NOT GO TO THESE web ip addeesses.

You can see where these sites are located by going to http://www.whatismyip.com.

There you'll find some great tools for finding ip origination.

We find, using the 'What Is My IP' web site, that these Hacks/Attacks come from an interesting country.

Below are the details from 'What Is My IP':

 

IP Address Host Name
118.123.5.105 Unknown
City Region/State Postal Code Country Name
CHENGDU SICHUAN - CHINA
Country Code Time Zone Latitude Longitude
CN +08:00 30.667 104.067
ISP Domain Name Net Speed IP Decimal
CHINANET SICHUAN PROVINCE NETWORK 163DATA.COM.CN - 1987773801

 

 

IP Address Host Name
124.235.106.127 Unknown
City Region/State Postal Code Country Name
JILIN JILIN - CHINA
Country Code Time Zone Latitude Longitude
CN +08:00 23.583 107.433
ISP Domain Name Net Speed IP Decimal
CHINANET JILIN PROVINCE NETWORK 163DATA.COM.CN - 2095803007
Entry #455

Comments

Avatar jarasan -
#1
They have npthing better to do.
Avatar LANTERN -
#2
I seem to pick trackers here at L.P. very often.
But but you get such every and anywhere on the internet, firewalls and such tell you.
A good firewall is a must have and if you have a high speed connection then a hardware firewall might be also needed, such as you just got.
Avatar JADELottery -
#3
In addition to my Router Firewall, we have our PC Firewalls as well. Before the Gigabit Security Router we had a simple Firewall Router, but it did not give this level of information and secuity. It worked, however, I like to see what IP address is trying the Hack/Attack. Also, it's nice to know what IP address these Hacks/Attacks are coming from; not just some mystery place in cyberspace.
Avatar jarasan -
#4
I was looking at the specs. for the router you have, and it also does a stateful packet inspection?   Are the origination IP addresses recorded in log events file, by filter settings, customization of event detail? Seems like you say, nice to know where these hackers are residing, hopefully they are being counter hacked.
Avatar JADELottery -
#5
It's a Linksys RVS4000.

The Protect Scope is:

Worm
DoS / DDoS
Buffer Overflow
Web Attack
Scan
Trojan Horse
IM / P2P

Also, along with the Firewall it has:

DoS Protection
Block WAN Request
Disable Remote Management
Disable Multicast
Disable SIP Application Layer Gateway

It keeps a log of Attacks and has Anomaly Dectection for:

HTTP
FTP
TELNET
RPC

Post a Comment

Please Log In

To use this feature you must be logged into your Lottery Post account.

Not a member yet?

If you don't yet have a Lottery Post account, it's simple and free to create one! Just tap the Register button and after a quick process you'll be part of our lottery community.

Register