NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
voerman
Mar 18, 2020Aspirant
Help needed with ORBI issue
Router RBR50 with firmware version V2.5.1.8 and behind a modem in bridge modus Satelitte RBS50 with wired backhaul (cat7) and firmware V2.5.1.8 Satelitte RBS50 with wired backhaul (cat7) and firmw...
FURRYe38
Mar 18, 2020Guru - Experienced User
What happens if you disable Armor?
Did you factory reset the RBR and RBS and setup from scratch after applying v2.5.1.8?
Use a whois to find out where those IP addresses are coming from.
voerman wrote:Router RBR50 with firmware version V2.5.1.8 and behind a modem in bridge modus
Satelitte RBS50 with wired backhaul (cat7) and firmware V2.5.1.8
Satelitte RBS50 with wired backhaul (cat7) and firmware V2.5.1.8
Netgear ARMOR is turned on
Since last week I am having issues with my Orbi setup and to date I haven't found a way to solve them. The problems started more or less after an software update. What happens is that the connections are more or less stable during the day but at night the wireless connections stop working. The only solution is restart all parts of the Orbi system the next day. It looks like the connection stops at 23:00 at night but not sure about that. Most of the time the router is still working ok and the satellites are offline for wifi. But sometimes the wifi of the router is stopping as well.
When I look at log files I see that I am getting Dos attacks but someone from my ISP said that could as well point at a security system not working properly. Does anybody know what I can do ?
Hope someone can help
Greets Roderick,
Here is a part of the log file
[DHCP IP: 192.168.1.14] to MAC address 18:b4:30:5e:b0:bf, Wednesday, March 18, 2020 08:00:19
[DoS Attack: ACK Scan] from source: 17.242.176.144, port 5223, Wednesday, March 18, 2020 07:57:51
[DHCP IP: 192.168.1.39] to MAC address 88:63:df:8e:35:8d, Wednesday, March 18, 2020 07:57:36
[WLAN access allowed] from MAC : 88:63:DF:8E:35:8D, Wednesday, March 18, 2020 07:57:31
[Access Control] Device IMAC-6DEALS with MAC address 88:63:DF:8E:35:8D is allowed to access , Wednesday, March 18, 2020 07:57:31
[DoS Attack: ACK Scan] from source: 34.237.198.82, port 11095, Wednesday, March 18, 2020 07:57:26
[DoS Attack: ACK Scan] from source: 3.86.149.151, port 11095, Wednesday, March 18, 2020 07:56:30
[DHCP IP: 192.168.1.26] to MAC address 14:91:82:0a:ce:ed, Wednesday, March 18, 2020 07:56:11
[DoS Attack: ACK Scan] from source: 34.195.152.165, port 11095, Wednesday, March 18, 2020 07:55:56
[WLAN access allowed] from MAC : 14:91:82:0A:CE:ED, Wednesday, March 18, 2020 07:55:40
[Access Control] Device WEMO with MAC address 14:91:82:0A:CE:ED is allowed to access the net, Wednesday, March 18, 2020 07:55:40
[DHCP IP: 192.168.1.26] to MAC address 14:91:82:0a:ce:ed, Wednesday, March 18, 2020 07:55:39
[DoS Attack: ACK Scan] from source: 34.237.198.82, port 11095, Wednesday, March 18, 2020 07:55:26
[DoS Attack: ACK Scan] from source: 3.86.149.151, port 11095, Wednesday, March 18, 2020 07:54:29
[DoS Attack: ACK Scan] from source: 34.195.152.165, port 11095, Wednesday, March 18, 2020 07:53:55
[DoS Attack: ACK Scan] from source: 34.237.198.82, port 11095, Wednesday, March 18, 2020 07:53:25
[DoS Attack: ACK Scan] from source: 3.86.149.151, port 11095, Wednesday, March 18, 2020 07:52:29
[DoS Attack: ACK Scan] from source: 3.80.102.142, port 11095, Wednesday, March 18, 2020 07:51:57
[DoS Attack: ACK Scan] from source: 34.195.152.165, port 11095, Wednesday, March 18, 2020 07:51:55
[DoS Attack: ACK Scan] from source: 34.237.198.82, port 11095, Wednesday, March 18, 2020 07:51:25
[DoS Attack: ACK Scan] from source: 18.207.62.3, port 11095, Wednesday, March 18, 2020 07:51:09
[DoS Attack: ACK Scan] from source: 3.86.149.151, port 11095, Wednesday, March 18, 2020 07:50:29
[DoS Attack: ACK Scan] from source: 3.80.102.142, port 11095, Wednesday, March 18, 2020 07:49:56
[DoS Attack: ACK Scan] from source: 34.195.152.165, port 11095, Wednesday, March 18, 2020 07:49:55
[WLAN access allowed] from MAC : 00:1D:63:04:C1:34, Wednesday, March 18, 2020 07:49:34
[DHCP IP: 192.168.1.15] to MAC address 00:1d:63:04:c1:34, Wednesday, March 18, 2020 07:49:34
[Access Control] Device MIELE-001D63FFFE04C134 with MAC address 00:1D:63:04:C1:34 is allowed, Wednesday, March 18, 2020 07:49:34
[DoS Attack: ACK Scan] from source: 34.237.198.82, port 11095, Wednesday, March 18, 2020 07:49:25
[DoS Attack: ACK Scan] from source: 18.207.62.3, port 11095, Wednesday, March 18, 2020 07:49:09
[WLAN access allowed] from MAC : 24:FC:E5:21:B4:1A, Wednesday, March 18, 2020 07:48:53
[Access Control] Device TIZEN with MAC address 24:FC:E5:21:B4:1A is allowed to access the ne, Wednesday, March 18, 2020 07:48:52
[DHCP IP: 192.168.1.10] to MAC address 24:fc:e5:21:b4:1a, Wednesday, March 18, 2020 07:48:52
[DoS Attack: ACK Scan] from source: 3.86.149.151, port 11095, Wednesday, March 18, 2020 07:48:28
[DHCP IP: 192.168.1.14] to MAC address 18:b4:30:5e:b0:bf, Wednesday, March 18, 2020 07:48:07
[DoS Attack: ACK Scan] from source: 3.80.102.142, port 11095, Wednesday, March 18, 2020 07:47:56
[DoS Attack: ACK Scan] from source: 34.195.152.165, port 11095, Wednesday, March 18, 2020 07:47:54
[WLAN access denied] from MAC : 38:D2:69:C0:1C:CF, Wednesday, March 18, 2020 07:47:54