My network has been attacked, and the attacker s IP has been traced, but I don t know the computer,

Updated on technology 2024-04-13
8 answers
  1. Anonymous users2024-02-07

    Installing an ARP firewall can prevent direct attacks on each other from devices on the LAN.

  2. Anonymous users2024-02-06

    Got an IP attacking? Can an IP attack ? Execution:

    netstat -ntu | awk '' | cut -d: -f1 | sort | uniq -c |After sort -n is executed, the number of connections to each IP address on all servers will be displayed. Check out the original post" to adopt.

  3. Anonymous users2024-02-05

    The firewall indicates that the system has been attacked.

    The so-called "attack" of common personal firewall programs is not necessarily a real network attack, and many firewall programs will use the most common network access, such as network broadcasting, as an attack to alert us and record it (especially in local area networks). Another "attack" could be someone scanning your computer's ports, or someone else being infected with a virus that is using the infected computer to scan other computers on the network.

    In general, as long as you update your system patches regularly, these so-called "attacks" generally do not pose any threat.

    Personally, I think that this kind of prompt of the firewall program is just a kind of "advertisement" in disguise, you see how useful I am, how powerful it is! There are so many attacks on the Internet, I have blocked them for you, there is nothing wrong with using me! If there was an attack and it told you that it wasn't blocked, would you still use it?

    I guess you're going to change your firewall right away, right?

  4. Anonymous users2024-02-04

    Hello! Restart the system, press F8 to enter safe mode when booting up, see if you can open the antivirus software and carry out a full antivirus, if possible, restart it into normal mode after the antivirus is completed to see if it is normal.

  5. Anonymous users2024-02-03

    Buy a genuine antivirus to kill it!

    Rising's good!

  6. Anonymous users2024-02-02

    Use a firewall to view the IP

    Run the firewall program and tick the "UDP Packet Monitoring" option in the "Custom IP Rules" column (the chat function in QQ uses UDP port 4000 as the data sending and receiving port). Then click on the disk-like icon on the tool button, and then click the OK button.

    Run QQ, when sending a message to a friend, after sending the message, switch to the window where the firewall program is located, and look at the current log recorded by the firewall (click the pencil-like button on the main interface to enter the log interface), the record format is as follows:

    11:07:33] UDP packets sent to native port of

    07:33] UDP packet received, native port: oicq client[4000], counter port:

    oicq server[8000], continue to the next rule.

    Among them" is the IP address of the friend, and then with the "pursuit" and other tools and software, you will know that the friend is generally in**.

    IP address refers to Internet Protocol address, which is the abbreviation of IP address. IP address is a unified address format provided by the IP protocol, which assigns a logical address to every network and each host on the Internet to mask the difference in physical addresses.

    There are still some IP** software, but most of them are charged.

  7. Anonymous users2024-02-01

    1. If you choose to keep personal files, it is equivalent to only resetting the system disk (C disk), and only the installed software programs are lost, except for the system disk, other disk files will still be retained.

    Do everything without the other person's knowledge. Here's how to do it.

    The first address of the network is opened

    Electricity, brain, high, hand, has, test, verification.

    2. If you choose to delete personal files, it is equivalent to the system disk and other disks will be formatted, select this item, and the things of other disks will be lost. This data that is suitable for other disks is not needed, such as the computer to be sold or given to others to use, and you don't want to leave what you have stored before.

    3. Since the function of resetting this computer is similar to reinstalling the system, there is still a difference between the two. First of all, resetting this computer can be done directly in the win10 settings; The reinstallation system is more troublesome, not only need to prepare a USB flash drive, but also need to make a boot USB flash drive, in addition to the **win10 system image.

    4. In addition, resetting this computer can choose whether to keep the files, and although the reinstallation system is similar, if you don't need to keep the files of other disks, you need to manually format other disks. Obviously, it is more convenient to reset this computer with a heavy installation system, and there is no need to worry about system activation problems, but resetting this computer can only solve minor problems, if the computer has been unable to enter the system, it still needs to be solved by reinstalling the system.

  8. Anonymous users2024-01-31

    At the beginning ==》cdm==> enter==>netstat -an press enter, you can see which IPs are connected to your computer

    established

    time_wait

    fin wait 1 and so on.

    These will appear later.

    established is connecting to your computer. Others are disconnected or waiting. If you want to find out which IP is attacking you. Third-party software available. Such as ice shields, etc.

Related questions
11 answers2024-04-13

Something is wrong with the system!

It is recommended to reinstall the system: buy a system disk, insert the disk after booting, and then restart the computer, the interface of the system disk will be displayed on the computer screen, choose to install the system directly into the first partition (C disk), wait for 10 minutes, and install it. >>>More

5 answers2024-04-13

This is the rubbing net, try it with 360 next anti-rubbing net.

13 answers2024-04-13

Internet speed limits. Generally, it refers to the speed limit of uploading and ** when you use a computer and mobile phone to surf the Internet, the speed limit is to limit your bandwidth transmission rate, the upstream rate is the rate at which you access the browser, and the downstream rate refers to the ** rate. >>>More

10 answers2024-04-13

If you are using a Huawei phone and can connect to Wi-Fi but cannot access the Internet, you can use the following methods to troubleshoot the problem: >>>More

11 answers2024-04-13

1. How to check if your wireless router is rubbed on the Internet, in fact, you don't need to log in to the wireless router every day to check; Auxiliary software can be installed** real-time monitoring - wireless installation assistant; The software can monitor the connection of the wireless router in real time on the computer without logging in to the router; >>>More