Update: UltraVNC 1.4.3.6 and UltraVNC SC 1.4.3.6: viewtopic.php?t=37885
Important: Please update to latest version before to create a reply, a topic or an issue: viewtopic.php?t=37864

Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://twitter.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc

Cyber attacks via U-VNC

Post Reply
Al Catraz
Posts: 1
Joined: 2013-10-29 17:05

Cyber attacks via U-VNC

Post by Al Catraz »

Hi
I have been using U-VNC for a while now.. FREE VERSION for my home use..
I upgraded to WIN7 and am having some problems with communicating -- but that is not the main issue..
I found that on the SERVER side there are many attempts to access the system via the U-VNC -- It is a NEW/CLEAN WIN7 so I cannot understand what/who already is trying to access the system by scanning the ports.. I have the AUTHENTICATE (accept) option set so I can see the IPs that is trying to access while waiting for the ACCEPT....
Seem to be from East-Europe !
Anybody has any idea what this could be ? I scanned for Trojan-Horse infections but system is said to be clean..

THNX
User avatar
Rudi De Vos
Admin & Developer
Admin & Developer
Posts: 6832
Joined: 2004-04-23 10:21
Contact:

Re: Cyber attacks via U-VNC

Post by Rudi De Vos »

I most cases setting another port then 5900 wil stop the attack.
They mostly use networkscanner to test port 5900 before the launch a brut force passwd attack.
Post Reply