Using the Attack Log

Every time an attack or intrusion occurs, and ProPort is able to disconnect it, it will be enter into the attack log. Users can clear the log, and save it to a text (.txt) file. Definitions of the attack log items:

Time

This item is obviously just the time that the attack took place.

Remote IP

This is the Remote IP of your attacker or intruder, helping you find out who is trying to attack you.

Port

This is the local port of the attack, in the case of a trojan, it's the port that is set up to listening for a connection on your computer.

Possible Trojan

The possible name of the attacking tool used by your attacker. It's determined off of the port used during the attack.