only one way to find out, call cox and see what they say, i doubt u sniffed their traiffic, however maybe Debookee sent them suspicious packets and now they just want to know what happened. Im not condoning lying..but sometimes people leave their wifi open and well...u know what happens from there on open wifi. you should learn your lesson as well and be careful with "security tools"
Debookee does ARP spoofing to intercept network traffic at Layer 2, ie it tries to fool both the target and the router with gratuitous ARP packet to represent the other's IP addresses.
From the ISP point of view, behind your router, I can't see how they can detect such interception, as they will see the IP and MAC of your router, and Debookee leaves the content of the packet intact, acting as a transparent router.
Debookee does not send "suspicious" packet.
One thing I'd think about is that it may come from your router: ARP spoofing is easily detectable at Layer 2, seeing the MAC address of a specific IP changing over the time, without delivering new DHCP lease. Nothing difficult.
Does your router report such detection to your ISP? That would be a possibility, and I'd be very interested in knowing more details if you have any.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :