1. Dashboard
  2. Mitglieder
    1. Letzte Aktivitäten
    2. Benutzer online
    3. Team
    4. Mitgliedersuche
  3. Filebase
  4. Forum
  5. Zebradem-WIKI
  6. Foren-Regeln
  7. Spenden Liste
    1. Spenden
  • Anmelden
  • Registrieren
  • Suche
ZebraDem-Sponsoring
Dieses Thema
  • Alles
  • Dieses Thema
  • Dieses Forum
  • Seiten
  • Dateien
  • Forum
  • Erweiterte Suche
  1. Forum
  2. Computer Ecke
  3. Hardware
  4. Router/Modem

Netgear WNR2000v4 (Internet connected & DoS Attack Problem)

  • Bondi007
  • 3. Januar 2017 um 21:57
  • Bondi007
    Schüler
    Punkte
    640
    Beiträge
    100
    • 3. Januar 2017 um 21:57
    • #1

    Hallo zusammen. Ich bin beim Internet Anbieter NetCologne Kunde, habe eine 25M Leitung
    Coaxial

    Als Modem benutze ich das Cisco (EPC3212) und als Router den Netgear (WNR2000v4)
    Nun habe ich eben Mal in die Log meines Routers nachgesehen und mir sind ein paar merkwürdige Sachen aufgefallen, zu einem ein Haufen DoS Attack, die aber zum großen Teil von Dropbox kommen, und von Yahoo. Da gehen ich von aus da ich die Apps sowohl auf dem Smartphone als auch auf dem Tablett laufen habe.
    Das andere sind die ziemlich vielen "Internet connected" Meldungen.

    Hat da jemand eventuell eine Idee woran es liegen kann? Oder ist diese Meldung am Router normal?!?.
    Ich selber habe mein Modem Mal resettet. Aber es ist wieder die Meldung "Internet connected" öfters aufgetaucht.

    Anbei mal den Log Ausschnitt meines Routers:

    Code
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 20:22:54
    [DHCP IP: 192.168.1.10] to MAC address ec:9b:f3:38:d6:57, Tuesday, January 03, 2017 20:22:47
    [admin login] from source 192.168.1.5, Tuesday, January 03, 2017 20:13:21
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 20:01:34
    [Internet connected] IP address: xx.%%.xx.%%%, Tuesday, January 03, 2017 19:51:31
    [admin login] from source 192.168.1.5, Tuesday, January 03, 2017 19:43:15
    [DHCP IP: 192.168.1.5] to MAC address d0:e7:82:4d:6f:0b, Tuesday, January 03, 2017 19:41:28
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 19:29:18
    [admin login] from source 192.168.1.5, Tuesday, January 03, 2017 19:21:09
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 19:16:39
    [DoS Attack: SYN/ACK Scan] from source: 104.96.39.190, port 80, Tuesday, January 03, 2017 19:14:40
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 19:12:47
    [Internet connected] IP address: %%.%%.xx.%%%, Tuesday, January 03, 2017 18:59:00
    [admin login] from source 192.168.1.5, Tuesday, January 03, 2017 18:58:04
    [admin login failure] from source 192.168.1.5, Tuesday, January 03, 2017 18:57:55
    [admin login failure] from source 192.168.1.5, Tuesday, January 03, 2017 18:57:49
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 18:51:29
    [DoS Attack: ACK Scan] from source: 217.146.190.8, port 443, Tuesday, January 03, 2017 18:48:06
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 18:48:02
    [DoS Attack: ACK Scan] from source: 217.146.190.8, port 443, Tuesday, January 03, 2017 18:47:50
    [DHCP IP: 192.168.1.2] to MAC address 00:09:34:40:64:d7, Tuesday, January 03, 2017 18:34:47
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 18:32:20
    [DoS Attack: RST Scan] from source: 108.160.172.237, port 443, Tuesday, January 03, 2017 18:25:47
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 18:25:31
    [Time synchronized with NTP server] Tuesday, January 03, 2017 18:23:00
    [DHCP IP: 192.168.1.10] to MAC address ec:9b:f3:38:d6:57, Tuesday, January 03, 2017 18:15:36
    [Internet connected] IP address: %%.%%.xx.%%%, Tuesday, January 03, 2017 18:06:30
    [DHCP IP: 192.168.1.4] to MAC address 40:f3:08:3a:ae:4c, Tuesday, January 03, 2017 18:03:09
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 17:27:31
    [DoS Attack: RST Scan] from source: 108.160.172.237, port 443, Tuesday, January 03, 2017 17:26:32
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 16:39:03
    [DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Tuesday, January 03, 2017 16:31:41
    [DoS Attack: RST Scan] from source: 45.58.74.129, port 443, Tuesday, January 03, 2017 16:27:55
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 16:22:03
    [Internet connected] IP address: %%.%%.%%.%%%, Tuesday, January 03, 2017 16:21:30
    [DoS Attack: RST Scan] from source: 108.160.172.237, port 443, Tuesday, January 03, 2017 16:19:05
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 16:08:17
    [DoS Attack: SYN/ACK Scan] from source: 37.187.142.146, port 5049, Tuesday, January 03, 2017 15:56:49
    [DHCP IP: 192.168.1.35] to MAC address 40:16:3b:db:b1:24, Tuesday, January 03, 2017 15:49:23
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 15:32:56
    [DoS Attack: RST Scan] from source: 108.160.172.205, port 443, Tuesday, January 03, 2017 15:32:49
    [DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, January 03, 2017 15:32:24
    [DoS Attack: RST Scan] from source: 108.160.172.193, port 443, Tuesday, January 03, 2017 15:29:47
    [Internet connected] IP address: %%.%%.85.%%%, Tuesday, January 03, 2017 15:29:00
    [DHCP IP: 192.168.1.3] to MAC address 00:30:67:a1:76:44, Tuesday, January 03, 2017 15:23:43
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 15:21:27
    [DHCP IP: 192.168.1.10] to MAC address ec:9b:f3:38:d6:57, Tuesday, January 03, 2017 15:20:19
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 15:19:38
    [DoS Attack: RST Scan] from source: 50.63.243.230, port 80, Tuesday, January 03, 2017 15:19:26
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 15:17:17
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 15:11:07
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 15:10:22
    [DoS Attack: RST Scan] from source: 50.63.243.230, port 80, Tuesday, January 03, 2017 15:09:57
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 15:09:55
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 15:06:28
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 15:05:54
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 15:03:42
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 14:47:51
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 14:46:47
    [DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Tuesday, January 03, 2017 14:44:46
    [DoS Attack: SYN/ACK Scan] from source: 149.56.6.88, port 80, Tuesday, January 03, 2017 14:43:01
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 14:42:54
    [DoS Attack: RST Scan] from source: 50.63.243.230, port 80, Tuesday, January 03, 2017 14:41:28
    [WLAN access rejected: incorrect security] from MAC address 94:39:e5:a2:c1:c5, Tuesday, January 03, 2017 14:41:06
    [DoS Attack: RST Scan] from source: 50.63.243.230, port 80, Tuesday, January 03, 2017 14:39:52
    Alles anzeigen
    • Zitieren

Jetzt mitmachen!

Du hast noch kein Benutzerkonto auf unserer Seite? Registriere dich kostenlos und nimm an unserer Community teil!

Benutzerkonto erstellen Anmelden

Spenden

Vielen Dank für die Unterstützung!
Hiermit unterstützt du Zebradem.
Das beinhaltet überwiegend die Serverkosten und Lizenzgebühren.
Spenden

Letzte Beiträge

  • CODA und der Kampf gegen Anime-Piraterie

    heugabel 18. Juni 2025 um 15:27
  • BREIN setzt Druck auf IPTV-Reseller

    heugabel 18. Juni 2025 um 09:27
  • Telegram und FSB: Ein Blick auf die Sicherheitslage des Messengers

    heugabel 17. Juni 2025 um 13:27
  • Irreführung durch eigene Anti-Piraterie-Kampagne

    heugabel 17. Juni 2025 um 11:27
  • Pluto TV

    Fellfresse 16. Juni 2025 um 21:58
  • Abschaltung des Darknet-Marktplatzes Archetyp und Verhaftung des Betreibers

    heugabel 16. Juni 2025 um 14:27
  • Samsung TV Plus/Rakuten TV

    Fellfresse 15. Juni 2025 um 19:04
  • Plex Live TV / LG Channels / Wedo TV

    Fellfresse 15. Juni 2025 um 19:00
  • Sorge um Felix von Leitner – Fefe bleibt verschwunden

    heugabel 15. Juni 2025 um 11:27
  • Die Realität des Passwort-Sharings bei Streaming-Diensten

    heugabel 14. Juni 2025 um 12:27

Aktivste Themen

  • SammelThread : Aktuelle AVM Labor Firmwares

    263 Antworten
  • FRITZ!Box 6360 Cable 85.06.04 Recover

    146 Antworten
  • Suchthread FritzBox Firmwares

    87 Antworten
  • UM Fritzbox 6360 Firmware update

    62 Antworten
  • AVM Labor firmwares Disskussions Thread

    57 Antworten
  • (gelöst) (Crossposting) NO-IP Fritzbox 7390 IP wird nicht angepasst CS nicht möglich

    47 Antworten
  • AVM Fritzboxen Fernzugriff abschalten-Hackgefahr

    45 Antworten
  • Problem mit Dyndns

    44 Antworten
  • Alice und Router

    41 Antworten
  • (gelöst) Fritzbox ohne Freetz täglich NEUSTARTEN lassen!

    39 Antworten
  1. Kontakt
© 2024 Zebradem - Software by WoltLab