Each day I receive about 12 e-mails from my firewall at work, full of logs. There are plenty of denied packets / will fall LAN -> WAN. I have run Nmap and Wireshark and am incapable to shape out what the procedure is generating the packets. A UDP-bap netstat reveals a set of open connections on substandard (e.g. port 40000) ports that are linked to [Dns.exe]. I have no idea what DNS is the process of trying to do, or are related to this at all. There are about 150 packages of this kind that hit the firewall over 10 minutes. I wonder what is causing it and stop service.
Bookmarks