What's next?

bot

Your computer might be infected with a a malicious program called a "bot". A bot is a malicious program that infects a computer and connects back to a central server (or servers) to receive commands. The infected computer becomes part of a so-called Botnet where hundreds or thousands of computers can be controlled by criminals. There are various types of bots, some will capture financial account login details, others send out spam messages and might participate in DDoS attacks.

Please see the removal section for information to check your system for malware.

openresolver

Openresolvers are improperly configured DNS recursive servers. DNS servers translate a domain (www.example.com) to and IP address (example of an IP address 8.8.8.8). Openresolvers can be used in DDoS attacks where the amplification power of DNS queries can be used to flood the internet connection of a victim.

Please see the removal section for information to check your system for malware.

bruteforce

The IP reported might have an automated process involved in automated scanning and attempts to get access to services via password guessing

Please see the removal section for information to check your system for malware.

proxies

The reported IP might be used as a proxy. A malicious program or router on the IP could have been compromised and result in unauthorized access of the Internet connection.

Please see the removal section for information to check your system for malware.

darknet

The IP has been observed during a scan of darknet IP address space. A darknet is a location on the Internet where no active services or servers reside and should not receive connections. These are 'dark' because there is, seemingly, nothing within these networks. A malicious program using the IP reported might be involved in an automated scan for vulnerable devices.

Please see the removal section for information to check your system for malware.


How to check and remove a possible botnet infection.

The removal of any type of malware can be difficult. Antivirus programs can assist in detecting malicious programs, but it is hard to tell if the malware is completly removed.

For windows operating systems Microsoft provides a free malware removal tool: https://www.microsoft.com/en-us/safety/pc-security/malware-removal.aspx

Some routers are known to have vulnerabilities that can be exploited. Making sure that the router isn't accessible via het Internet is good practice if you don't require remote access. Steve Gibsons Shields Up provides information on open ports that can give an indication if services can be accessed from the internet.

Some safe Internet browsing tips are available here