After putting my modem in bridged mode, I started getting these anonymous logon events in my home machine. I have Avast antivirus which has inbuilt firewall too, plus default windows firewall is also always on. Searched the web, and it says not to be alarmed if the source ip is 127.0.0.1. There were two successful logon attempts and one was from Japan and another from Newzealand. :huh: I did a reverse ip lookup on those ip addresses.
It also shows it was using 128bit encryption to make the logon attempt. :S
Both connections got logged off when I disconnected my net in the morning.
I saw these in event viewer when I was looking at possible cause why my net disconnection script was not working.
Event Id: 4624
So is someone hacking into my comp? And to get in my comp through two firewalls is :S
I think I'll be switching back to PPOE mode on router. The NAT on the router works quite well I say to keep these intrusions off.
EDIT: There were 4 more successful attempts from 4 different machines while I was typing this. None after I switched back to PPOE mode on router and enabled NAT.
It also shows it was using 128bit encryption to make the logon attempt. :S
Both connections got logged off when I disconnected my net in the morning.
I saw these in event viewer when I was looking at possible cause why my net disconnection script was not working.
Event Id: 4624
An account was successfully logged on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
New Logon:
Security ID: ANONYMOUS LOGON
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x51c55d
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: HOD
Source Network Address: 118.236.xxx.xxx
Source Port: 3086
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
Logon Type: 3
New Logon:
Security ID: ANONYMOUS LOGON
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x5241f8
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: HOD
Source Network Address: 212.115.xxx.xxx
Source Port: 50222
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128
So is someone hacking into my comp? And to get in my comp through two firewalls is :S
I think I'll be switching back to PPOE mode on router. The NAT on the router works quite well I say to keep these intrusions off.
EDIT: There were 4 more successful attempts from 4 different machines while I was typing this. None after I switched back to PPOE mode on router and enabled NAT.