am i being monitored? The magic box had the stock OS provided by the manufacturer. Thanks again to everyone for their help! I did a wifi device scan using SoftPerfect Wifi Guard and have a device I do not know. If more info are needed, I’ll be happy to provide the necessary. The result is I have logs of only a few hours of connection history, and I don't know of a way to capture all traffic for long periods without running out of space. Please select the 'Public Computer' option if this is not a machine you use regularly, then enter your User ID below and click 'Submit' to access the system. That's another bad clue to me. should have upside-down-ternet'd him :) .. it's a little high on the CPU cycles but it's epic fun: http://www.ex-parrot.com/pete/upside-down-ternet.html. Service Pack 1 (6.1.7601 Build 7601) Pentium Dual-Core CPU. 0. votes. If possible, I’d like to avoid this, for the convenience of my less tech savvy flat mates, but I can get to it if need be. I can now confirm that my magic box does show separately wired and wireless, even when no longer connected. Is there any way to get more information on these devices ? I’ve changed the PS4’s hostname to a more descriptive one than new-host and made sure its MAC was allowed. What should I look for there? Hon Hai Precision Industry Co., Ltd., trading as Foxconn, is a Taiwanese multinational electronics contract manufacturing company headquartered in Tucheng, New Taipei, Taiwan. i searched my network said everything was fine but i noticed that i had a device attected to my network, i click the arrow to see what it was and it said Hon Hai Precision ind. Insurance companies are under siege from cyberattacks. I plan to get on site soon to do that. Routers, switches, wireless, and firewalls. Co.,Ltd. if not is it safe to ignore? From my phone and PC, I can see two nwtworks: “ISP-5Ghz-NetworkName” and “ISP-NetworkName”. Sure, they bring Internet to your devices, but today's routers do so much more. My app lists the information below. #ATTCOMMUNITY 2.1k. - Answered by a verified Network Technician. I have my legacy printer connected to the 2.4 Ghz “network”, but I can print on it with a local IP from my notebook connected to the 5 Ghz network. It's most likely your laptop. So unblocked him and dumped some packets for a while, and eventually found out who this kid is, and that he is looking to buy a college essay, and is looking for the best electronic cigarette. Short of running a cable across the hallway or buying a new adapter, that’s what they’re up for. The device name using "Laptop-XXXX" is suspect, on the other hand. This comment has been overwritten by an open source script. I feel it's something to do with my brothers PS4. One of the offending devices turned out to be my flat mate’s laptop (facepalm). If a guest were to come over, it would be a hassle to set him/her up on the network, as proposed to just give them the password. Recent Examples on the Web: Noun Like English, Swedish used two pronouns to indicate the gender of a person, hon (she) and han (he). Sony Playstations will routinely phone home and perform/download updates when they are in resting mode. The SSID for the compromised network was not the default one that came with the magic box. By continuing to use this site you consent to the use of cookies on your device as described in our cookie policy unless you have disabled them. To the best of my knowledge there are no other devices in the house that would be accessing my network. This is my strongest indicator that the console isn’t the offending device. The 4th is a Hon Hai Precision device. This product is available as Renewed. Beyond the IoT devices and the HoneyTrain, researchers have used honeypots to expose vulnerabilities with medical devices, gas stations, industrial control systems used for such things as electrical power grids, and more. How to find out what an unidentified device can be after an IP scan? I have not installed a new OS or anything recently. If I'm really lucky I might be able to intercept an incoming brute force attack, but that's just a guessing game and I wouldn't really know what to do with it. She found that it didn’t do much to help save money or even find any coupons, for that matter. So I figured out that our routers have a packet monitor function. MAC addresses are comically easy to spoof, but I doubt the unknown devices you are seeing are using spoofed MACs. We use cookies to give you the best possible experience on our website. BOFH in the making right here, well played. I also want to find out who they are so if they are sneaking in, I can mess with them. The “Social networking” feature was turned off (my ISP offers the possibility to connect to other clients’ networks while away from home. The magic box allows me to set up a “guest network”, which looks like an isolated VLAN, but I didn’t have it set up at the time. Press question mark to learn the rest of the keyboard shortcuts. I'll run some tests. This does not match the intruder’s MAC, not even in the initial prefix. If the situation were to get out of hand again, I’ll take these further steps. So there's this device connected to my router. It's always good to be diligent when it comes to monitoring your network; most likely the devices you are seeing are your flatmate's stuff/gaming consoles. Find the latest HON HAI PRECISION INDUSTRY (HNHAF) stock quote, history, news and other vital information to help you with your stock trading and investing. This is a small update with today’s tests and news. These devices were named LAPTOP-XXXXXX, suggesting they were something that really shouldn’t have been on my network without my knowledge. MAC addresses are comically easy to spoof, but I doubt the unknown devices you are seeing are using spoofed MACs. wistron neweb corporation device on my network. From the few logs I have I can only see when they connected and disconnected (timestamp), their hostname, IP and MAC adresses. Someone off site hopping onto our network? A MAC address has six pairs of hexadecimal numbers. Ideal for streaming HD Video and gaming on multiple devices at a time. Currently I have throttled them to 2Kbps up and down. Also quite a bit of non-SSL port 80 traffic. I'm now thinking that consoles like to enter stand-by rather than being powered off and they phone home every once in a while, but the LAPTOP-XXXXX and the incompatible connections times with gaming still remain. Hello r/HomeNetworking ! It's built on Linux base framework, like so ma… In the past, that’s how I identified as a forgotten iPad an otherwise unknown device.