This gets a little touchy, if this guy/gal is good then they are going through mutiple boxes to get to you. If they are going through a proxy box then see if it is runing wingate or other telnet proxy software. You need to see what the log files from the hijacked box are to see the connected...
Sapient2003 is right, if this is a spoofed IP then the attacker will never know what is happening since the spoofed ip is not his ip. What you will want to do is take a log of what is happening and see where it is comming from. Do a WhoIs on the addresses and find out if they belong to a...
If you want to see the programs that are useing ports then look at the eathereal logs then run fport.exe. Fport.exe will look at your open ports and then map the program that is running on that port. Fport is free and takes only a secound, run it from a command prompt...
I had the same problem, I called my ISP and they turned off port 25 off and I had to use thier smtp gateway for sending mail. If that is the case then you can forwared your mail to thier smtp server.
If that is not the case then you need to see if port 25 is open and running. Here are some...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.