- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hello,
Does anyone now the source address 0.0.127.243?
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
That doesn't seem like a valid IP address.
Might need TAC to investigate that.
I opened the TAC SR two or three weeks before I wrote this.
It is with R&D.
Regards
Peter
Looks a bit look a loopback IP that got messed up. Do you know traffic comes from internal or internet?
I see destination internal IP and not external so I assume internal?
@JP_Rex Did you ever get an answer on this?
I also noticed something similar in a customer's environment. Reading the packet capture shows a different source IP than the log, itself.
I'm in the process of investigating the device generating the traffic to learn more. Considering opening a TAC case to report it as unexpected behavior, since this doesn't otherwise appear to be a valid log.
@JP_RexGot a response for a CP representative. Looks like this is a bug that will be patched by PRHF-36797.
Sounds good.
Did you have the same IP Pattern (0.0.127.x) in your logs?
Regards
Peter
Yes, same IPs specifically in IPS logs. Reviewing the attached packet captures in Wireshark showed the real source IP.
You might have TAC double check with R&D whether PRHF-36797 is relevant to your case.
Do that.
But check the RAW log entry before How to enable raw log data for firewall logs in R80.x and R81.x
Because the SmartView Service adds Information and may change the RAW Data.
Regards
Peter
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
same issue
We have also found this kind of log among our customers. Will this bug be included in the R81.20 jumbo hotfix?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY