New
open
ports
found
(Only
if
the
port
was
not
seen
open
in
the
previous
2
months)
The
Internet
Security
Check
scanned
the
external
side
of
your
router
and
found
an
open
port
that
was
not
seen
open
for
the
last
60
days.
Please
check
your
router
and
NAT
configuration
for
port
forwarding
:
review
the
port
forwarding
rules
and
remove
the
unneeded
ones.
If
UPnP
or
NAT-PMP
are
enabled
on
your
router,
devices
and
applications
can
automatically
bypass
the
firewall
to
allow
incoming
connections
without
additional
control
or
authorization.
For
more
details
and
to
see
the
full
list
of
open
ports,
open
the
'Internet
Security'
section
in
the
Fing
app.
A
Wi-Fi
station
is
being
attacked
A
very
common
way
to
start
an
attack
via
Wi-Fi
is
by
forcing
the
client
devices
to
detach
from
the
current
“legitimate”
access
point
and
reconnect
to
a
“rogue”
one.
This
is
a
very
common
attack,
usually
performed
in
coffee
shops,
hotels
and
public
places
(if
you
often
use
such
public
WiFi
services
without
Wi-Fi
encryption,
we
suggest
you
activate
a
high
quality
VPN
service
like
ProtonVPN
or
similar,
before
turning
on
the
Wi-Fi).
This
attack
is
also
popular
in
office
places
where
the
Wi-Fi
password
is
one
and
shared
among
all
users
(versus
Wi-Fi
authentication
with
personal
credentials).
After
the
deauthentication
attack,
clients
typically
reconnect
to
the
access
point
with
the
stronger
signal.
For
this
reason,
the
rogue
access
point
“shines”
in
the
radio
spectrum.
Immediately
after
receiving
the
Fingbox
alert
,
open
the
Fing
app,
go
to
the
DigitalFence
screen
and
tap
on
STATIONS
.
At
the
top
of
the
list
you
should
see
your
access
points
plus
another
one
claiming
the
same
Wi-Fi
network
name
(SSID).
In
the
example
below,
the
first
access
point
is
the
rogue
one,
claiming
the
same
SSID.
Fingbox
User’s
Guide
-
App
v6.2.1
Page
51