×
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
rce
Contributor
Message 1 of 4

Suspicious connections

Jump to solution

Getting thousands suspicious connections blocked.   Many are attempted connections by my ISP which would not seem to suspicious.   Many of the others are from Akami Technology and are coming from the same location in my state.  The ISP connections are trying to connect to a UDP port while the others are trying to connect to a TCP port.  Why the difference and why are ISP connections blocked?

1 Solution

Accepted Solutions
AvinashP
McAfee Retired
McAfee Retired
Message 4 of 4

Re: Suspicious connections

Jump to solution

Hi @rce,

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP.

The Firewall checks the incoming IP address (a unique identifier that helps identify Internet-connected devices) against McAfee Global Threat Intelligence (GTI) database. GTI catalogs the reputationsof IP addresses around the globe. IP addresses associated with phishing websites, sites infected with malware, or otherwise malicious sites, have a 'bad' reputation in the GTI database. So, they are blocked from connecting to your PC and show up as risky connections in your McAfee software.

For information about the IP addresses, please contact your ISP.

Thanks,

Avinash.

View solution in original post

3 Replies
AvinashP
McAfee Retired
McAfee Retired
Message 2 of 4

Re: Suspicious connections

Jump to solution

Hi @rce,

McAfee Firewall stops any unsafe connections being made to your computer. You might see large amounts of blocked connections in your Security History. Don’t be alarmed – your McAfee software is simply telling you that it is keeping you safe. 
McAfee will alert you in the bottom right of your screen, if there is any action needed.

You can refer to the below article for more information about the same,

Your McAfee software blocked risky connections 

 

Thanks,

Avinash.

rce
Contributor
Message 3 of 4

Re: Suspicious connections

Jump to solution

But why would attempted connections by my ISP be considered "suspicious."?   And what is the difference between attempts to connect to a UDP port and attempts to connect to a TCP port.   The ISP attempts are all to the TCP port.

AvinashP
McAfee Retired
McAfee Retired
Message 4 of 4

Re: Suspicious connections

Jump to solution

Hi @rce,

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP.

The Firewall checks the incoming IP address (a unique identifier that helps identify Internet-connected devices) against McAfee Global Threat Intelligence (GTI) database. GTI catalogs the reputationsof IP addresses around the globe. IP addresses associated with phishing websites, sites infected with malware, or otherwise malicious sites, have a 'bad' reputation in the GTI database. So, they are blocked from connecting to your PC and show up as risky connections in your McAfee software.

For information about the IP addresses, please contact your ISP.

Thanks,

Avinash.

How Many Badges Can You Collect?
Ready for a little competition? Members like you are earning badges and unlocking perks for their helpful answers. Are you? Click here to find out.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community