Jump to content

Daidai

Members
  • Posts

    29
  • Joined

  • Last visited

Posts posted by Daidai

  1. 11 hours ago, itman said:

    Note that the above would be valid if the destination port was 67; refer to the following:

    Next, note the following:

    https://kb.eventtracker.com/evtpass/evtPages/PortNo_68_bootpclient_56538.asp

    I can't help but think this is related to your obsession in blocking Eset connections to Google DNS servers and changes you made to Eset default firewall rules to accomplish this.

    This happens even no device is connected to the router, so it is not related to ESET firewall.

  2. 8 hours ago, cutting_edgetech said:

    When using proxies it is possible to spoof the last address that is forwarded to the destination IP address. They could be spoofing the last address so that it shows 0.0.0.0. It helps mask the attacker's exit node, making it more difficult to block the attacker's address. It still may be possible to see the attackers exit node address with a good packet sniffer like Wireshark.

    Thanks, I will try and see.

  3. @Enrico

    I have tried disableing the spam filter, sorry to say it remains the same.

    @Marcos

    The 8.8.8.8:53 connection at ekrn happens occasionally and randomly, it can appears at startup, after browsing the Internet, or when I am doing nothing.

    @itman

    I am sure to tell you this is not related to the Great Firewall. Under the 'One country two systems' policy, Hong Kong can use Google DNS servers.

     

    I am starting to think is it possible that it is because I have disabled some default firewall rules? But I have leaved the "outbound DNS request" enabled.

×
×
  • Create New...