Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: SOCKS Filter|
SOCKS filter: failed to bind IP address <ip address>:<port> for listening.
Future SOCKS requests will be refused.
For more information, see Help and Support Center at
|English: Request a translation of the event description in plain English.|
From a newsgroup post: "If you do not require SOCKS then just disable the SOCKS V4 Filter."
This event usually occurs together with event 14060 from "Microsoft Firewall". A specific error code in the 14060 event may indicate a conflict on port 1080, typically used by the SOCKS service.
|Private comment: Subscribers only. See example of private comment|
|Links: Event ID 14060|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated