Unidentified traffic

Hello all!

Periodically, I see high activity of the Outbound connection, it is about 8-10 Mbps, and I can’t understand who initiated this traffic. On the Connections tab (Firewall section), I see a huge list of connections from the different Internet hosts to my WAN IP address. I checked a couple of them as a “destination” address in the same table and didn’t find any matches. After rebooting the Router, this activity disappears for some time, btw my WAN IP is not static.
How can I determine the reason of this traffic and prevent/block it in the future?

Mikrotik interface statistics:

Thank you

Try to use Tools → Torch to identify the source of the traffic. It can be anything, from torrent client inside of LAN to …

I recommend not looking at any logs, one sleeps better at night.

Try to use Tools → Torch to identify the source of the traffic. It can be anything, from torrent client inside of LAN to …

Correct me if I wrong, but Torch tool shows the same information as on the Connections tab. (IP - Firewall - Connections). I see the source IP there, but the destination IP is not a private IP from my network, it is the IP of Mikrotik, so I can’t understand who initiated this traffic.

What version of RouterOS are you running, are any services accessible from the internet?

It is odd for the Mikrotik to be the connection destination IP address if the traffic is outbound.

What version of RouterOS are you running, are any services accessible from the internet?

Version is 6.42.2
As for the services, I’m not sure how to check everything, but we using L2TP VPN.

From your post it’s impossible to understand real situation, so it is very hard to advice for you.
Do not mix connections with traffic. Torch shows little bit different info :slight_smile:
You have to analyze unwanted connections:
f.e. to what port goes that connection, what program listening on that port, which one local IP are sending packets to IP from where connections bothers you and etc…
This is quite a creative task :wink:

If I remember right, 6.42 had some vulnerabilities exploitable from remote. So you have to carefully examine all of configuration (including scripts or proxy config or socks, etc.). Or, if this is beyond your ROS skills, either get some ROS expert to do it. The other safe option is to netinstall device with modern ROS version and configure stuff needed … and base your new configuration on the new factory default config - using old config only as a reminder what needs to work and not how exactly it should be done.