Hi Jakub,
I SOLVED the issue, and yes, AVAST is at fault for providing false positives with its latest update. This is for AVAST Program Version 20.9.2437 (build 20.9.5758.615). Here's a short recap of what we were discussing. Just after an October AVAST update, I started getting second by second notifications from the Remote Access Shield feature that a BruteForce attack was being made. The notifications appeared to be in waves with some being blocked and others allowed, but always a connection attempt going in bursts of seconds, then ceasing after a while, then resuming again. All the IP Addresses were in IPv6 and not IPv4. I've never dealt with IPv6 addresses so I could not identify the origin and tell you whether the IP addresses were internal in my network or from the outside. I did tell you that it was unlikely that I was receiving an attack from the outside since all the PC's on the network had Remote Desktop turned off. What I did to understand what was going on was to download a demo copy of Net Scan Tools Pro and look at the Network Neighbors table. The Network Neighbors table is like an IPv4 ARP cache but for IPv.6. I never knew that. From the Network Neighbors table, I was able to identify the MAC addresses of the IPv6 addresses recorded by AVAST. I then used Angry IP Scanner to identify and correlate the MAC addresses with IPv.4 addresses, which allowed me to identify the sources of the "attacks". The so-called "attacks" were merely the 5 PC's on my network coming on and off of the network at different times of the day. This flaw is more annoying than debilitating, but is should be corrected by AVAST. Thanks.