Read more about event names in the ESET firewall log.
If the ESET firewall detects a threat to your system, create an exception for internal IP traffic. Run the DNS flush tool if the issue is not resolved.
Determine if the IP address detected in the notification is a number that falls within the following range (where "x" is 0-255):
Review the IP addresses in the notification:
Click Protections, click Network access protection and click Edit next to IP sets.
In the IP sets window, select Addresses excluded from IDS and click Edit.
Type the device's IP address being incorrectly detected as a threat in the Remote computer address (IPv4, IPv6, range, mask) field. Click OK three times to save your changes and to exit Advanced setup.
You should no longer see any messages about attacks from an internal IP address that you know to be safe. If you continue to experience this issue, proceed to solution 2 below.
Instead of entering ipconfig /flushdns to Command Prompt, you can use the ESET DNS Flush tool to flush your DNS cache.
Download the DNS-Flush tool and save the file to your Desktop.
Navigate to your Desktop, extract or open Flush DNS.zip and double-click Flush DNS.exe (if prompted to continue, click Yes). The tool will automatically flush and register your DNS cache.
After your computer restarts, open your ESET product and run a Computer scan.
The Computer scan should finish without detecting an infection. If no threat is detected, no further action is needed.
Still experiencing an issue? Contact ESET Technical Support.