It is from IP 190.6.38.79 towards what? An IP on another network, or just local to the router where this rule is defined?
Missing the “deny-” in any log line.
Local acces to the router is the “input” chain, not the “forward” chain.
Access to an IP address in the same subnet as the source probably never passes the firewall, but is just bridged.
Under /ip → services, you have the list with various services like http,https,ssh,winbox,api etc.
Only ENABLE those that are relevant and set the IP’s from which is allowed. By default they are world reachable if you do not narrow them down of filter them otherwise (eg. on prerouting chain)
Not an answer to your question, but for me it seems that you have Winbox open to internet???
If so, you are at high risk of being hacked. (older RouterOS has a big bug)
Use VPN to access winbox, then you do not need to block anyone.
If VPN can not be used, follow these steps.
Use another port than default.
Use port knocking. This prevents someone from seeing open ports.
Use a long and good password.
Use access list to prevent any random internet from accessing your router.
Log everything. (See my signature for example.)
Upgrade firmware to latest stable release
++++
Your access list does block some IP to not access Winbox. In step 4, you should block all, only allow valid IP.
and so on and so on.
You can decide yourself howmany “stages” the sequence must be, but 3-stage is pretty secure with extemely small chance of somebody ever hitting the jackpot
I would also implement something to put “portscanners” on a ban-list if too many attempts are made in a certain time-window, because otherwise you can keep trying port-combinations forever.
Anyone who tries 1 port on my router that are not default open (like 443 is open) will be banned for all ports for 24 hour, even the open ports (443).
There are avrund 5000 to 10000 ip in the block list at any time.