3 weeks ago
Hello everyone,
I recently discovered a mysterious port forwarding rule on my Google Wifi settings, and I have no idea where it came from. The rule is named 'VIRtc Camera' and is set to UDP protocol.
Has anyone else encountered a similar issue?
Details:
- Rule name: VIRtc Camera
- Protocol: UDP
- External port: 30134
- Internal port: 33668
- IP address: 192.168.X.XXX
- MAC address: 1C:XX:3E:95:XX:XX
I didn't create this rule, and I'm concerned about its presence on my network. Can someone please help me understand:
1. What is this rule for?
2. How did it get created?
3. Is it a security risk?
4. How can I remove it safely?
Thank you for your help in resolving this issue.
Best regards,
Freddy ⍟
Answered! Go to the Recommended Answer.
3 weeks ago
Hello @ForeverFreddy
I'm not familiar with that, but a quick internet search found something called ViRTC, described as "A Web-powered Virtual Desktop for the Oculus Quest. No install required!"
Is it possible you have an Oculus Quest and used this tool through a browser on your network? It's based on WebRTC, but I'm not sure why it would need a port to be opened if your desktop and headset are on the same network as each other.
If you don't recognize this tool, I would delete that rule and consider disabling UPnP, since that allows creating port forwards, at least until you can be sure you don't have anything more worrisome going on.
You may be able to get a clue about which device this is by finding the matching IP address in your current devices list.
3 weeks ago
Hello @ForeverFreddy
I'm not familiar with that, but a quick internet search found something called ViRTC, described as "A Web-powered Virtual Desktop for the Oculus Quest. No install required!"
Is it possible you have an Oculus Quest and used this tool through a browser on your network? It's based on WebRTC, but I'm not sure why it would need a port to be opened if your desktop and headset are on the same network as each other.
If you don't recognize this tool, I would delete that rule and consider disabling UPnP, since that allows creating port forwards, at least until you can be sure you don't have anything more worrisome going on.
You may be able to get a clue about which device this is by finding the matching IP address in your current devices list.
3 weeks ago
Hello @MichaelP,
I appreciate you for taking the time to respond. Unfortunately this keeps happening over and over again. I don't have an OCULUS and I have deleted it before just to find out 2/3 weeks later that is exactly there. I tried that of looking up the IP with the list of availables I have connected and none match.
3 weeks ago
Hmm. That's pretty strange. Did you disable UPnP (in the Advanced settings for Nest WiFi Pro)?
At this point, I think I'd be taking a closer look at a few things. I'd start out looking at whether your account is the only one added to your Google Home, just to be sure someone else isn't adding this. I'd also do a little checkup on your Google account security – not something I can help with, unfortunately, but you should be able to change your Google account password and check to see if there are devices using your account that you aren't familiar with.