NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Mikey94025
Sep 25, 2016Hero
Intermittent internet connectivity outage with Orbi?
I just installed my new Orbi router yesterday, replacing a Nighthawk R8500. I believe that overall wireless coverage has improved, though top-end performance is not quite as high (measured via fast....
- Sep 29, 2016
I read in the other "Ring Door Bell" thread that a customer had better results after disabling "Enable Implicit BEAMFORMING". So I tried that just to see what happens. It's probably too early to tell yet, but my 2 Nest cameras have only disconnected once in the past 2 days and I think that's because there was a power outage at my house today (I wasn't home and both cameras went out at the same time, something the intermittent outages haven't done).
dsc_dewain
Oct 14, 2016Guide
Just adding log lines, the time stamps appear to be 4 hours off, not sure where to fix that.
Not sure if the 'attacks' are causing issues.
[DoS Attack: ACK Scan] from source: 31.13.69.226, port 443, Friday, October 14, 2016 07:33:21
[DHCP IP: 192.168.1.12] to MAC address f8:f1:b6:d9:b2:ce, Friday, October 14, 2016 07:30:43
[DHCP IP: 192.168.1.10] to MAC address ac:3c:0b:38:44:07, Friday, October 14, 2016 07:30:28
[admin login] from source 192.168.1.112, Friday, October 14, 2016 07:23:36
[DoS Attack: ACK Scan] from source: 199.4.160.29, port 443, Friday, October 14, 2016 07:12:55
[DoS Attack: SYN/ACK Scan] from source: 206.190.57.61, port 443, Friday, October 14, 2016 07:12:45
[DoS Attack: ACK Scan] from source: 199.4.160.29, port 443, Friday, October 14, 2016 07:10:53
[DoS Attack: SYN/ACK Scan] from source: 92.222.85.168, port 80, Friday, October 14, 2016 06:49:30
[DoS Attack: ACK Scan] from source: 31.13.69.195, port 443, Friday, October 14, 2016 06:43:12
[DHCP IP: 192.168.1.112] to MAC address ec:f4:bb:1b:19:82, Friday, October 14, 2016 06:42:35
[DoS Attack: ACK Scan] from source: 31.13.69.195, port 443, Friday, October 14, 2016 06:41:57
[DHCP IP: 192.168.1.4] to MAC address a0:04:60:0e:a9:b4, Friday, October 14, 2016 06:11:21
[DHCP IP: 192.168.1.22] to MAC address 90:02:a9:69:d6:09, Friday, October 14, 2016 06:00:33
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 58473, Friday, October 14, 2016 05:56:28
peteytesting
Oct 14, 2016Hero
dsc_dewain wrote:Just adding log lines, the time stamps appear to be 4 hours off, not sure where to fix that.
Not sure if the 'attacks' are causing issues.
[DoS Attack: ACK Scan] from source: 31.13.69.226, port 443, Friday, October 14, 2016 07:33:21
[DHCP IP: 192.168.1.12] to MAC address f8:f1:b6:d9:b2:ce, Friday, October 14, 2016 07:30:43
[DHCP IP: 192.168.1.10] to MAC address ac:3c:0b:38:44:07, Friday, October 14, 2016 07:30:28
[admin login] from source 192.168.1.112, Friday, October 14, 2016 07:23:36
[DoS Attack: ACK Scan] from source: 199.4.160.29, port 443, Friday, October 14, 2016 07:12:55
[DoS Attack: SYN/ACK Scan] from source: 206.190.57.61, port 443, Friday, October 14, 2016 07:12:45
[DoS Attack: ACK Scan] from source: 199.4.160.29, port 443, Friday, October 14, 2016 07:10:53
[DoS Attack: SYN/ACK Scan] from source: 92.222.85.168, port 80, Friday, October 14, 2016 06:49:30
[DoS Attack: ACK Scan] from source: 31.13.69.195, port 443, Friday, October 14, 2016 06:43:12
[DHCP IP: 192.168.1.112] to MAC address ec:f4:bb:1b:19:82, Friday, October 14, 2016 06:42:35
[DoS Attack: ACK Scan] from source: 31.13.69.195, port 443, Friday, October 14, 2016 06:41:57
[DHCP IP: 192.168.1.4] to MAC address a0:04:60:0e:a9:b4, Friday, October 14, 2016 06:11:21
[DHCP IP: 192.168.1.22] to MAC address 90:02:a9:69:d6:09, Friday, October 14, 2016 06:00:33
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 58473, Friday, October 14, 2016 05:56:28
the dos attacks are more than likley dead torrents you have downloaded then closed , if there is lots it could swamp the nat table