And don’t forget to filter „xitter“ as that is probably also recommended.
And don’t forget to filter „xitter“ as that is probably also recommended.
Well, I just went through some online instructions to setup an inbound rule in Windows Defender Firewall that is a list of IPs to have it block, hoping that will solve this ongoing problem I was having.
Not that I can tell, this is what shows up in the logs of just one of the hack or scan attempts.
Malwarebytes www.malwarebytes.com
-Log Details- Protection Event Date: 1/2/24 Protection Event Time: 10:48 PM Log File: f150648e-a9ea-11ee-8d8b-04d4c458e8f6.json
-Software Information- Version: 4.6.7.301 Components Version: 1.0.2222 Update Package Version: 1.0.79191 License: Premium
-System Information- OS: Windows 10 (Build 19045.3803) CPU: x64 File System: NTFS User: System
-Blocked Website Details- Malicious Website: 1
-Website Data- Category: Compromised Domain: IP Address: 45.79.168.172 Port: 6667 Type: Inbound
It’s more like an inbound connection that is triggering the alert.
No, I don’t have any ports forwarded to my PC from the internet as far as I’m aware.
In this case, the fake email address could be sacbuntchris(at)lemmy.world to be used with that idiot bot.
At least it didn’t state “Your booking is confirmed for the presidential suite in (insert very expensive hotel and location here)” and make you feel you need to make a lot of phone calls to many different places while trying to figure out what is going on.
And then someone tries that again with “Just realized that “downside up” means “the down side is up”, making it downside up” to see if it makes anymore sense.