Although I'm not answering to the starting question, my device was hacked too and I was forced to use netinstall . So my questions are: How the intruder gained access in the first place? What's the use of this hack (remote control, packet sniff, ddos attacks, bitcoin mining)? How can I check if the ...
I know this was mentioned in another post but I'm really frustrating with this issue in my network. The following is an example of my log: log.jpg As you can see is full of the same issue caused by a cheap Chinese IP camera which (for the moment) I can't replace. This is the only device which althou...
{
/tool fetch url="http://myip.dnsomatic.com/" mode=http dst-path=mypublicip.txt
local ip [file get mypublicip.txt contents ]
put $ip
:log info ($ip)
}
Well I'm definitely missing something major here. :) :oops: I tried few times to use the rule but "no juice". I tried to create two different rules for two different devices, but no success. Any ideas? My master interface is bridge1 (where the rule is targeting). Is this correct? 5.jpg The...
Hello Mikrotik experts I'm completely noob with Mikrotik and routerOS and I need your precious help. (so be gentle on me) :D Major question Hairpin NAT My setup is as follows: LAN > Mikrotik (with PPPoE Dialing) > MODEM > ISP (with Dynamic IP) I have several server devices on LAN (1 NVR, 1 web based...