I have upload bandwidth activity full from my router to internet.
I see that the source IP is 209.249.222.27/32 (erotic site) port 53(dns) destination my LAN IPs on different ports (IPs of computers connected to LAN interface).
Different port for each IP.
Please, what configuration I can do for dropping and not accepting any connections from/to this IP.
What may it is?
OK. Tank You for your reply. I will read with attention those articles.
But please, what config I must do on firewall for blockin that activity on fastest way?
The “attack” still continue. But now with 2 other IPs, 64.125.23.254 & 209.249.222.45. Even from port 80 of these 2 new IPs.
I tried to block these new IPs with firewall rules but no result.
No matter what you do the drop rules wont make any effect. It’s going for 2.3 Megabits / second so it’s not fast enought to drop all the data.
But what i know about this upload thing, is that u have a file called suhhost.exe in c:\windows\system 32\ which is starting with windows also i dont know what does it do. but if u delete it; it will work. first u have to end it’s process suhhost.exe from the taskmanager and then u have to delete the file. Watch in mikrotik how the upload stops when u end its process from the taskmanager. If u want a good antivirus , use kaspersky it will detect it.
Tell me what will come with you.
Mu PCs are protected with clean slate. When I do a restart the computer goes on the state that I left when I activated Clean Slate.
So, a little bit possibilities are that the PCs might be infected.
Its bean about 3 days that I see no upload traffic toward those IPs.
My question is: Why mikrotik does not blocked dropped upload traffic toward these IP before.
One thing would be to find the local IP the packets are coming/going from/to… Then check if it’s a real traffic (disconnect those machines). Then check the machines for any spyware, ad-aware etc.