

ip firewall address-list add address=198.20.64.0/18 list=rogue_vpn_hosts ip firewall address-list add address=76.190.234.39 list=rogue_vpn_hosts ip firewall address-list add address=46.148.174.31 list=rogue_vpn_hosts ip firewall address-list add address=83.169.211.0/24 list=rogue_vpn_hosts

ip firewall address-list add address=77.243.148.0/22 list=rogue_vpn_hosts ip firewall address-list add address=144.217.181.56 list=rogue_vpn_hosts ip firewall address-list add address=71.6.167.142 list=rogue_vpn_hosts ip firewall address-list add address=154.85.56.0/24 list=rogue_vpn_hosts ip firewall address-list add address=71.6.135.0/24 list=rogue_vpn_hosts ip firewall address-list add address=216.195.192.0/19 list=rogue_vpn_hosts ip firewall address-list add address=185.195.201.148 list=rogue_vpn_hosts ip firewall address-list add address=71.6.146.128/26 list=rogue_vpn_hosts ip firewall address-list add address=71.6.158.128/26 list=rogue_vpn_hosts ip firewall address-list add address=93.174.95.106 list=rogue_vpn_hosts ip firewall address-list add address=195.37.190.88 list=rogue_vpn_hosts ip firewall address-list add address=80.82.77.139 list=rogue_vpn_hosts

ip firewall address-list add address=71.6.165.200 list=rogue_vpn_hosts Is there any way these connection attempts could "sniff out" any way to connect to my network?Ĭode: Select all /ip firewall address-list add address=66.240.192.0/18 list=rogue_vpn_hosts I have my IPsec settings configured with the Xauth road warrior policy based method. Pasting the above unknown IP addresses into Google reveals they all have a history of being reported for abuse.
