Prevent my computer from accessing a specific IP

Updated on technology 2024-03-10
9 answers
  1. Anonymous users2024-02-06

    You can use firewall software to restrict this IP address, please note: there are two steps to complete the access action, the first is for your computer to send a packet, and the second is to access the IP to return a packet. As long as you disable the IP from sending packets to your computer, it is equivalent to disabling your computer from accessing the IP!

  2. Anonymous users2024-02-05

    1. Before a large number of field IPs access you**, there will be a lot of access IPs in various places during the time period that should not appear, and the time is still very close. Moreover, visiting the same page, there is nothing to, only IP and time.

    2. When you see that these IPs are accessing you every day, you need to strengthen the maintenance of the background and FTP. But you still can't find out why your ** is accessed, and then after a while, you will find that the same IP field starts to access your ** in large batches. At any time, visit all your pages in large batches.

    3. In this situation, it is probably ** that it was attacked, and all the pages were collected. However, if these IP fields appear every day these days, and you are accessing your ** every day, then you ** are really being attacked, not just being collected. Looking at this IP, the result is as follows:

    4. You can restrict a certain field on the IIS server. Open IIS, select the ** you want to set, open "Properties" - "Directory Security", find "IP Address and Domain Name Restrictions" and add the IP field you want to restrict.

  3. Anonymous users2024-02-04

    If you're a personal webmaster:

    1. Register for promotion.

    2. Make your ** bound to promotion.

    4. Find all the tools at the bottom.

    5. Find the shield in all the tools and set the shielding IPPS in it: the shielding IP in the business shield is divided into two kinds of sock bridges, one is through the system settings to automatically screen the IP that is repeatedly clicked, and the other is to block the IP through manual settings.

  4. Anonymous users2024-02-03

    Take the XP system as an example:

    Open: Control Panel - Management Tools - Local Security Settings. Tap IP Security Policy on the left side of the local computer.

    Then right-click Create IP Security Policy to open the IP Security Policy Wizard.

    Next, the name of the IP security policy appears, just start it. For example, it's called blocking.

    Next, the activation default response rule appears, do not check, remove the hook.

    Next, select the properties and you're done.

    Then the IP Security Policy Attribute appears, click Add at the bottom, the rule attribute appears, click Add, and the IP Policer list appears. I remove the use of the Add Wizard and click Add on the right, and the filter properties appear.

    In the address bar, select a specific IP for the original address. The target IP is my IP address. Then click OK.

    Now go back to the IP filter list, click OK, there should be an additional list in the rule properties, select it. Then switch to the Filter Actions tab, remove the Use Add Wizard, and click Add. In the Security measures tab in the Filter Actions attribute that appears, select Block and click OK.

    There will be an additional option to block in the Filter Actions tab, select it.

  5. Anonymous users2024-02-02

    Just turn off your computer sharing.

  6. Anonymous users2024-02-01

    Software name: Rabbit! Sub-dynamic IP

    Software language: Chinese simplified.

    Software category: Network Acceleration.

    Operating environment: WinXP Vista Win7 Win8 Win10 mobile phone.

  7. Anonymous users2024-01-31

    It depends on what you need.

    A rabbit that has always been used. Dynamic. ip。The software is ok.

    It's true that a lot of work now requires a lot of IP to operate.

    It's convenient to switch IP with one click, and there are also dynamic, static, and advanced lines.

  8. Anonymous users2024-01-30

    Prevent an IP or IP range from accessing yours via IIS settings.

    Figure 12, click "Add", if you want to block a certain IP from accessing your **, then select "A computer", enter the IP you want to block below, for example, as shown in Figure 2:

    Prevent an IP or IP range from accessing yours via IIS settings.

    Figure 23, if you want to block a segment of IP access, then select "a group of computers", the following is an example in detail: if you want to block the IP segment starting with 128, then enter it in the "network identity" and enter it in the "subnet mask"; If you want to block the starting IP range, enter it in the "Network Identity" field and the "Subnet Mask" field, as shown in Figure 3

    Prevent an IP or IP range from accessing yours via IIS settings.

    Figure 3 Through the above three simple steps, you can easily prevent an IP or IP segment from accessing your **, but don't try to use this way to block the attack, it seems that it can't resist the attack... Hope to adopt.

  9. Anonymous users2024-01-29

    There are many techniques that can achieve this in different environments:

    If it is a home broadband router, you can set a blacklist on the router to prohibit the specified IP from accessing your router to surf the Internet.

    If the environment is an enterprise network, you can configure an ACL on the switch or router to disable access to the specified IP address.

    If it is a server, you can use a firewall or other tool to prohibit the specified IP from accessing your own **.

Related questions
10 answers2024-03-10

I'll teach you a simple way.,No one can open it.,Only if you know the method.,Even if others look at it, they don't know that you added a password.,But he can't open it at all.,He will definitely think that there is a problem with the program.。 >>>More

25 answers2024-03-10

First of all, it is recommended to be brand new, if the landlord insists on saving money first, and is not based on games, then some provincial levels can be considered. >>>More

8 answers2024-03-10

There is no object in this sentence. To put it more completely, there should be no one to take your place in my heart. It's the best.

7 answers2024-03-10

This is a problem with the system, only restore the system or reinstall, this is why I must prepare the restoration software before using the computer, open the built-in restoration, system problems are frequent, and the problem is not solved in ** settings, right? >>>More

5 answers2024-03-10

Ringing at startup: Constant ringing (long sound): The memory module is not plugged in tightly or damaged. Reinsert the memory module, or replace the memory. >>>More