NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Mrbchambers's avatar
Mar 04, 2019
Solved

[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17 [DoS

I have just setup and started to use a Nighthawk XR500 (Previously using R1 with DumaOS installed), when I looked at the log all I could see was [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985 (This is the routers IP address) . It seems to happen multiple times a minute,  the port address changes, and the internet seems to reconnect occasionally.

 

The firmware is upto date. I have to have my router connected to the houses main router, though it does come through a DMZ. The R1 worked fine without any complaints with this configuration. Do you have any suggestions?

 

What follows is a small sample of the Routers log:-

 

[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58

 

 

 

 

 

 

  • FURRYe38's avatar
    FURRYe38
    Mar 05, 2019

    Ah, That explains it. Yes, having another router infront of the XR router would probably generate this condition. This would be a double NAT condition which isn't recommended.

     

    What happens if you replace the TP=Link router with the XR router? I presume it would work well. 

     

    FYI, I tried the AC5400, nice and all. Not good for multiple game consoles playing same game at the same time and forum support is lacking. Also upgrading FW, you can revert back FW versions either. I sent mine back. 


    Mrbchambers wrote:

    Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.

     

    I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.


     

6 Replies

  • FURRYe38's avatar
    FURRYe38
    Guru - Experienced User

    What is the Mfr and model# of the ISP modem the NG router is connected too?

     

    What happens if you remove the XR router from the main host routers DMZ? 


    Mrbchambers wrote:

    I have just setup and started to use a Nighthawk XR500 (Previously using R1 with DumaOS installed), when I looked at the log all I could see was [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985 (This is the routers IP address) . It seems to happen multiple times a minute,  the port address changes, and the internet seems to reconnect occasionally.

     

    The firmware is upto date. I have to have my router connected to the houses main router, though it does come through a DMZ. The R1 worked fine without any complaints with this configuration. Do you have any suggestions?

     

    What follows is a small sample of the Routers log:-

     

    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58
    [DoS Attack: IP Spoofing] from source: 192.168.1.1, port 48311, Monday, March 04, 2019 14:33:58

     

     

     

     

     

     


     

    • Mrbchambers's avatar
      Mrbchambers
      Guide

      Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.

       

      I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.