NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Chad16's avatar
Chad16
Follower
May 01, 2020

DumaOS log information help

Hi Guys,

 

So i was looking at the log and noticed the below, I am aware that some things that show up on the log look worse than what they are but when google some of the IP addresses they come to be pretty dodgy. I have my Ps4 added to DMZ, I have Unpnp turned off as well as port forwarding, port triggering and remote management. Could someone give me some advice? is it normal that some of the ip addresses have been reported in the past? Have I been hacked? Do i need to remove my Ps4 from dmz? Thanks in advance

 

 

[LAN access from remote] from 189.234.96.240:34332 to 192.168.1.6:23, Friday, May 01, 2020 00:38:59
[LAN access from remote] from 62.28.199.194:32062 to 192.168.1.6:23, Friday, May 01, 2020 00:38:40
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:102, Friday, May 01, 2020 00:38:22
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:10025, Friday, May 01, 2020 00:38:09
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:20000, Friday, May 01, 2020 00:37:55
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:3307, Friday, May 01, 2020 00:37:51
[LAN access from remote] from 71.6.233.201:1024 to 192.168.1.6:1024, Friday, May 01, 2020 00:37:48
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:27017, Friday, May 01, 2020 00:37:43
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:8080, Friday, May 01, 2020 00:37:40
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:2323, Friday, May 01, 2020 00:37:25
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:445, Friday, May 01, 2020 00:37:09
[LAN access from remote] from 102.39.13.179:49364 to 192.168.1.6:8291, Friday, May 01, 2020 00:36:30
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:8095, Friday, May 01, 2020 00:36:29
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:220, Friday, May 01, 2020 00:36:24
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:3389, Friday, May 01, 2020 00:36:19
[LAN access from remote] from 162.243.137.63:32833 to 192.168.1.6:1900, Friday, May 01, 2020 00:36:18
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:443, Friday, May 01, 2020 00:36:17
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:9000, Friday, May 01, 2020 00:36:16
[LAN access from remote] from 41.67.137.243:48076 to 192.168.1.6:8295, Friday, May 01, 2020 00:36:15
[LAN access from remote] from 89.248.168.202:54593 to 192.168.1.6:3373, Friday, May 01, 2020 00:36:13
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:6379, Friday, May 01, 2020 00:36:07
[DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 33098, Friday, May 01, 2020 00:36:04
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:5672, Friday, May 01, 2020 00:35:56
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:123, Friday, May 01, 2020 00:35:50
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:143, Friday, May 01, 2020 00:35:47
[LAN access from remote] from 77.247.110.58:5389 to 192.168.1.6:5060, Friday, May 01, 2020 00:35:26
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:1434, Friday, May 01, 2020 00:35:24
[LAN access from remote] from 41.67.137.243:48076 to 192.168.1.6:8297, Friday, May 01, 2020 00:35:21
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:23, Friday, May 01, 2020 00:35:19
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:125, Friday, May 01, 2020 00:35:13
[LAN access from remote] from 207.237.12.108:4446 to 192.168.1.6:81, Friday, May 01, 2020 00:35:13
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:7547, Friday, May 01, 2020 00:35:09
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:22, Friday, May 01, 2020 00:35:05
[LAN access from remote] from 185.216.140.252:42164 to 192.168.1.6:1613, Friday, May 01, 2020 00:35:04
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:1911, Friday, May 01, 2020 00:34:50
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:106, Friday, May 01, 2020 00:34:45
[LAN access from remote] from 45.227.255.233:61000 to 192.168.1.6:631, Friday, May 01, 2020 00:34:40

 

 

1 Reply

  • Is the IP of your PS4 that you've put into the DMZ 192.168.1.6? If so that is the reason why these entries are appearing and I would then suggest you disable the DMZ just to be safe. I don't think it is anything sinister - for example one of the IPs is from a company that scans systems for vulnerabilities in order to improve security.