I've been playing around with look n stop, and I have been noticing a lot of traffic being blocked that says Type: ETH 0006. Now, most of these connections are coming from wireless clients that are connected on my wireless network. The two main mac addresses are from devices that I recognize, but when I changed the password on my wireless network, and these devices no longer have the correct wifi password, Look n Stop is still recording inbound connections from these machines. I'm running a Linksys router flashed with tomato firmware, and I'm using WPA2 with AES encryption. My question is, if they no longer have the correct wireless password, why are they still able to send packets to machines connected to my router? Is this a security risk?