<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hi,is 217.160.208.160 your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655499#M197109</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;is 217.160.208.160 your public WAN IP?&lt;/P&gt;&lt;P&gt;you could leverage netflow on your 891.&lt;/P&gt;&lt;P&gt;see link below:&lt;/P&gt;&lt;P&gt;http://wannabelab.blogspot.com/2013/11/configuring-netflow.html&lt;/P&gt;</description>
    <pubDate>Fri, 13 Feb 2015 03:48:15 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2015-02-13T03:48:15Z</dc:date>
    <item>
      <title>How can I find the infected device on my LAN?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655496#M197106</link>
      <description>&lt;P&gt;We are getting blacklisted every day because of traffic from our WAN IP to an External IP address.&lt;/P&gt;&lt;P&gt;Since I have blocked the external IP address in an ACL,&amp;nbsp;we aren't blacklisted anymore.&lt;/P&gt;&lt;P&gt;In the ACL, I see the&amp;nbsp;matches slowly increasing. But I don't see any Nat translation to this External address.&lt;/P&gt;&lt;P&gt;How can I find the infected device on my Network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655496#M197106</guid>
      <dc:creator>erwin1969</dc:creator>
      <dc:date>2019-03-12T05:29:33Z</dc:date>
    </item>
    <item>
      <title>Which firewall are you using</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655497#M197107</link>
      <description>&lt;P&gt;Which firewall are you using?&lt;/P&gt;&lt;P&gt;If ASA then you can use the command "show conn" then look at a host making multiple connections from random source ports.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2015 07:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655497#M197107</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-02-12T07:58:44Z</dc:date>
    </item>
    <item>
      <title>Hi Andre, it's no ASA, but a</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655498#M197108</link>
      <description>&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it's no&amp;nbsp;ASA, but a&amp;nbsp;Cisco 891 router.&lt;/P&gt;&lt;P&gt;I have created following line in the ACL:&amp;nbsp;5 deny ip any host 217.160.208.160 (8 matches)&lt;/P&gt;&lt;P&gt;There isn't a lot of traffic to this WAN address, mainly at night or in the morning, but enough to get listed by CBL.&lt;/P&gt;&lt;P&gt;Any idea how I can monitor traffic or find out who is trying to connect to&amp;nbsp;217.160.208.160?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2015 18:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655498#M197108</guid>
      <dc:creator>erwin1969</dc:creator>
      <dc:date>2015-02-12T18:47:25Z</dc:date>
    </item>
    <item>
      <title>hi,is 217.160.208.160 your</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655499#M197109</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;is 217.160.208.160 your public WAN IP?&lt;/P&gt;&lt;P&gt;you could leverage netflow on your 891.&lt;/P&gt;&lt;P&gt;see link below:&lt;/P&gt;&lt;P&gt;http://wannabelab.blogspot.com/2013/11/configuring-netflow.html&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2015 03:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655499#M197109</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-02-13T03:48:15Z</dc:date>
    </item>
    <item>
      <title>I'm guessing that the IP you</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655500#M197110</link>
      <description>&lt;P&gt;I'm guessing that the IP you provided (you suspect) is the&amp;nbsp;destination host that the infected machine is trying to contact?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can try to create an extended ACL with any source and destination 217.160.208.160 then set a debug on all matching traffic. Something like this below.&lt;/P&gt;&lt;P&gt;router(config)access-list 100 permit ip any host 217.160.208.160&lt;/P&gt;&lt;P&gt;router#debug ip packet 100 detail&lt;/P&gt;&lt;P&gt;Or you can leverage netflow if you have a collector set up as has been recommended by &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A about="/users/johnlloyd13" class="username" datatype="" href="https://supportforums.cisco.com/users/johnlloyd13" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;johnlloyd_13&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2015 05:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-find-the-infected-device-on-my-lan/m-p/2655500#M197110</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-02-13T05:27:18Z</dc:date>
    </item>
  </channel>
</rss>

