NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

jackylee0908's avatar
jackylee0908
Aspirant
Jun 16, 2022

Many DoS attack events in log (RAX80)

Hi,

 

I got sometimes the internet couldn't access so I tried to check RAX80 log but also sometimes I could not able to see the login page, but finally I could login to the RAX80 and saw below logs, seems that the issue was caused by DoS attack, but I'm not sure, so I need your help to check below logs, to see which ones might be the root caused and how I can prevent it again(internet can't access issue), thanks.

 

[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Thursday, Jun 16,2022 07:28:01
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Thursday, Jun 16,2022 07:27:51
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 07:19:50
[DoS attack: RST Scan] from source 143.255.131.193,port 642 Thursday, Jun 16,2022 07:05:56
[LAN access from remote] from 193.233.191.181 port 52803 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 06:52:50
[DoS attack: RST Scan] from source 143.255.128.204,port 376 Thursday, Jun 16,2022 06:41:50
[DoS attack: snmpQueryDrop] from source 162.142.125.135,port 13554 Thursday, Jun 16,2022 06:37:28
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 06:28:17
[DoS attack: snmpQueryDrop] from source 147.203.255.20,port 36857 Thursday, Jun 16,2022 06:14:51
[LAN access from remote] from 103.151.122.22 port 47599 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 05:36:13
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:31:47
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:30:03
[DoS attack: snmpQueryDrop] from source 198.199.106.214,port 40103 Thursday, Jun 16,2022 05:23:52
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:13:42
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:12:06
[DoS attack: snmpQueryDrop] from source 107.152.217.162,port 12131 Thursday, Jun 16,2022 05:00:09
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:29
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:16
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:13
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:31:47
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:30:03
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:25:20
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:24:15
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:33
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:23
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:13
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:03
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:12:44
[DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:12:32
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:31:47
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:26:33
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:25:43
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:24:15
[LAN access from remote] from 80.82.77.144 port 44986 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 03:04:19
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 02:31:46
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 02:07:30
[DoS attack: snmpQueryDrop] from source 198.235.24.18,port 54486 Thursday, Jun 16,2022 01:59:52
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 01:31:46
[DoS attack: snmpQueryDrop] from source 147.203.255.20,port 57211 Thursday, Jun 16,2022 01:23:17
[DoS attack: snmpQueryDrop] from source 91.134.185.90,port 20575 Thursday, Jun 16,2022 01:02:32
[LAN access from remote] from 94.102.61.47 port 38945 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 00:42:53
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 00:31:46
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 00:20:05
[DoS attack: snmpQueryDrop] from source 185.94.111.1,port 52973 Thursday, Jun 16,2022 00:19:34
[LAN access from remote] from 89.248.163.213 port 40981 to 192.168.1.5 port 5000 Wednesday, Jun 15,2022 23:43:42
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:43:26
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:43:10
[DoS attack: snmpQueryDrop] from source 92.118.161.53,port 60858 Wednesday, Jun 15,2022 23:36:29
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:31:46
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:49
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:39
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:29
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:19
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:09
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:59
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:49
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:39
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:29
[DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:19
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:38:56
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:38:42
[DoS attack: ACK Scan] from source 31.13.87.34,port 443 Wednesday, Jun 15,2022 22:33:03
[DoS attack: ACK Scan] from source 104.115.249.249,port 443 Wednesday, Jun 15,2022 22:30:33
[DoS attack: ACK Scan] from source 104.22.55.126,port 443 Wednesday, Jun 15,2022 22:29:58
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:29:17
[DoS attack: ACK Scan] from source 104.115.249.249,port 443 Wednesday, Jun 15,2022 22:28:12
[DoS attack: ACK Scan] from source 142.251.43.14,port 443 Wednesday, Jun 15,2022 22:27:56
[DoS attack: ACK Scan] from source 35.201.105.49,port 443 Wednesday, Jun 15,2022 22:27:29
[DoS attack: ACK Scan] from source 34.96.74.134,port 443 Wednesday, Jun 15,2022 22:27:24
[DoS attack: ACK Scan] from source 23.96.112.38,port 443 Wednesday, Jun 15,2022 22:27:17
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:55
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:54
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:54
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:53
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:53
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:46
[DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:25:45
[DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:45
[DoS attack: ACK Scan] from source 170.114.15.26,port 443 Wednesday, Jun 15,2022 22:25:44
[DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:25:44
[DoS attack: ACK Scan] from source 170.114.15.26,port 443 Wednesday, Jun 15,2022 22:25:43
[DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:25:40
[DoS attack: ACK Scan] from source 172.217.160.78,port 443 Wednesday, Jun 15,2022 22:25:29
[DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:28
[DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:28
[DoS attack: ACK Scan] from source 13.35.24.89,port 443 Wednesday, Jun 15,2022 22:25:28
[DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:27
[DoS attack: ACK Scan] from source 13.35.24.89,port 443 Wednesday, Jun 15,2022 22:25:27
[DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:27
[DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:26
[DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:26
[DoS attack: ACK Scan] from source 13.35.7.40,port 443 Wednesday, Jun 15,2022 22:25:25
[DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:25
[DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:25
[DoS attack: ACK Scan] from source 13.35.7.40,port 443 Wednesday, Jun 15,2022 22:25:24
[DoS attack: ACK Scan] from source 211.21.118.138,port 443 Wednesday, Jun 15,2022 22:25:22
[DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:19
[DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:19
[DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:18
[DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:18
[DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:17
[DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:17
[DoS attack: ACK Scan] from source 142.251.43.10,port 443 Wednesday, Jun 15,2022 22:25:07
[DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:25:04
[DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:46
[DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:24:41
[DoS attack: ACK Scan] from source 20.198.162.78,port 443 Wednesday, Jun 15,2022 22:24:41
[DoS attack: ACK Scan] from source 17.57.145.27,port 5223 Wednesday, Jun 15,2022 22:24:41
[DoS attack: ACK Scan] from source 162.125.35.134,port 443 Wednesday, Jun 15,2022 22:24:40
[DoS attack: ACK Scan] from source 20.198.162.78,port 443 Wednesday, Jun 15,2022 22:24:40
[DoS attack: ACK Scan] from source 162.125.35.134,port 443 Wednesday, Jun 15,2022 22:24:39
[DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:38
[DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:37
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:22:45
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:22:12
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:21:59
[DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:21:46
[DoS attack: ACK Scan] from source 35.244.184.98,port 443 Wednesday, Jun 15,2022 22:16:36
[DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:36
[DoS attack: ACK Scan] from source 35.244.184.98,port 443 Wednesday, Jun 15,2022 22:16:35
[DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:35
[DoS attack: ACK Scan] from source 35.201.74.116,port 443 Wednesday, Jun 15,2022 22:16:34
[DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:34
[DoS attack: ACK Scan] from source 35.201.74.116,port 443 Wednesday, Jun 15,2022 22:16:33
[DoS attack: ACK Scan] from source 142.251.42.238,port 443 Wednesday, Jun 15,2022 22:14:36
[DoS attack: ACK Scan] from source 18.65.3.31,port 443 Wednesday, Jun 15,2022 22:14:35
[DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:34
[DoS attack: ACK Scan] from source 142.251.42.232,port 443 Wednesday, Jun 15,2022 22:14:34
[DoS attack: ACK Scan] from source 18.65.3.31,port 443 Wednesday, Jun 15,2022 22:14:34
[DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:33
[DoS attack: ACK Scan] from source 142.251.42.232,port 443 Wednesday, Jun 15,2022 22:14:33
[DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:32
[DoS attack: ACK Scan] from source 170.114.14.75,port 443 Wednesday, Jun 15,2022 22:13:56
[DoS attack: ACK Scan] from source 172.217.163.42,port 443 Wednesday, Jun 15,2022 22:13:38
[DoS attack: ACK Scan] from source 13.225.173.34,port 443 Wednesday, Jun 15,2022 22:13:37
[DoS attack: ACK Scan] from source 172.217.163.42,port 443 Wednesday, Jun 15,2022 22:13:37
[DoS attack: NetBiosReplyDrop] from source 192.168.1.10,port 137 Wednesday, Jun 15,2022 22:13:18
[DoS attack: NetBiosReplyDrop] from source 192.168.1.10,port 137 Wednesday, Jun 15,2022 22:13:08
[DoS attack: ACK Scan] from source 20.197.71.89,port 443 Wednesday, Jun 15,2022 22:13:07
[DoS attack: ACK Scan] from source 170.114.15.49,port 443 Wednesday, Jun 15,2022 22:13:05
[DoS attack: ACK Scan] from source 17.57.145.27,port 5223 Wednesday, Jun 15,2022 22:13:04
[DoS attack: ACK Scan] from source 8.252.189.122,port 443 Wednesday, Jun 15,2022 22:12:37

3 Replies

  • Hi,

     

    I got sometimes the internet couldn't access so I tried to check RAX80 log but also sometimes I could not able to see the login page, but finally I could login to the RAX80 and saw below logs, seems that the issue was caused by DoS attack, but I'm not sure, so I need your help to check below logs, to see which ones might be the root caused and how I can prevent it again(internet can't access issue), thanks.

     

    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Thursday, Jun 16,2022 07:28:01
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Thursday, Jun 16,2022 07:27:51
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 07:19:50
    [DoS attack: RST Scan] from source 143.255.131.193,port 642 Thursday, Jun 16,2022 07:05:56
    [LAN access from remote] from 193.233.191.181 port 52803 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 06:52:50
    [DoS attack: RST Scan] from source 143.255.128.204,port 376 Thursday, Jun 16,2022 06:41:50
    [DoS attack: snmpQueryDrop] from source 162.142.125.135,port 13554 Thursday, Jun 16,2022 06:37:28
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 06:28:17
    [DoS attack: snmpQueryDrop] from source 147.203.255.20,port 36857 Thursday, Jun 16,2022 06:14:51
    [LAN access from remote] from 103.151.122.22 port 47599 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 05:36:13
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:31:47
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:30:03
    [DoS attack: snmpQueryDrop] from source 198.199.106.214,port 40103 Thursday, Jun 16,2022 05:23:52
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:13:42
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 05:12:06
    [DoS attack: snmpQueryDrop] from source 107.152.217.162,port 12131 Thursday, Jun 16,2022 05:00:09
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:29
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:16
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:55:13
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:31:47
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:30:03
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:25:20
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 04:24:15
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:33
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:23
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:13
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:13:03
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:12:44
    [DoS attack: TCP SYN Flood] from source 89.248.163.187,port 43947 Thursday, Jun 16,2022 04:12:32
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:31:47
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:26:33
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:25:43
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 03:24:15
    [LAN access from remote] from 80.82.77.144 port 44986 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 03:04:19
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 02:31:46
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 02:07:30
    [DoS attack: snmpQueryDrop] from source 198.235.24.18,port 54486 Thursday, Jun 16,2022 01:59:52
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 01:31:46
    [DoS attack: snmpQueryDrop] from source 147.203.255.20,port 57211 Thursday, Jun 16,2022 01:23:17
    [DoS attack: snmpQueryDrop] from source 91.134.185.90,port 20575 Thursday, Jun 16,2022 01:02:32
    [LAN access from remote] from 94.102.61.47 port 38945 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 00:42:53
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 00:31:46
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Thursday, Jun 16,2022 00:20:05
    [DoS attack: snmpQueryDrop] from source 185.94.111.1,port 52973 Thursday, Jun 16,2022 00:19:34
    [LAN access from remote] from 89.248.163.213 port 40981 to 192.168.1.5 port 5000 Wednesday, Jun 15,2022 23:43:42
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:43:26
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:43:10
    [DoS attack: snmpQueryDrop] from source 92.118.161.53,port 60858 Wednesday, Jun 15,2022 23:36:29
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 23:31:46
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:49
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:39
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:29
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:19
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:49:09
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:59
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:49
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:39
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:29
    [DoS attack: TCP SYN Flood] from source 89.248.165.103,port 44497 Wednesday, Jun 15,2022 22:48:19
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:38:56
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:38:42
    [DoS attack: ACK Scan] from source 31.13.87.34,port 443 Wednesday, Jun 15,2022 22:33:03
    [DoS attack: ACK Scan] from source 104.115.249.249,port 443 Wednesday, Jun 15,2022 22:30:33
    [DoS attack: ACK Scan] from source 104.22.55.126,port 443 Wednesday, Jun 15,2022 22:29:58
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:29:17
    [DoS attack: ACK Scan] from source 104.115.249.249,port 443 Wednesday, Jun 15,2022 22:28:12
    [DoS attack: ACK Scan] from source 142.251.43.14,port 443 Wednesday, Jun 15,2022 22:27:56
    [DoS attack: ACK Scan] from source 35.201.105.49,port 443 Wednesday, Jun 15,2022 22:27:29
    [DoS attack: ACK Scan] from source 34.96.74.134,port 443 Wednesday, Jun 15,2022 22:27:24
    [DoS attack: ACK Scan] from source 23.96.112.38,port 443 Wednesday, Jun 15,2022 22:27:17
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:55
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:54
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:54
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:53
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:25:53
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:46
    [DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:25:45
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.11,port 137 Wednesday, Jun 15,2022 22:25:45
    [DoS attack: ACK Scan] from source 170.114.15.26,port 443 Wednesday, Jun 15,2022 22:25:44
    [DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:25:44
    [DoS attack: ACK Scan] from source 170.114.15.26,port 443 Wednesday, Jun 15,2022 22:25:43
    [DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:25:40
    [DoS attack: ACK Scan] from source 172.217.160.78,port 443 Wednesday, Jun 15,2022 22:25:29
    [DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:28
    [DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:28
    [DoS attack: ACK Scan] from source 13.35.24.89,port 443 Wednesday, Jun 15,2022 22:25:28
    [DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:27
    [DoS attack: ACK Scan] from source 13.35.24.89,port 443 Wednesday, Jun 15,2022 22:25:27
    [DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:27
    [DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:26
    [DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:26
    [DoS attack: ACK Scan] from source 13.35.7.40,port 443 Wednesday, Jun 15,2022 22:25:25
    [DoS attack: ACK Scan] from source 13.35.7.2,port 443 Wednesday, Jun 15,2022 22:25:25
    [DoS attack: ACK Scan] from source 13.35.7.2,port 80 Wednesday, Jun 15,2022 22:25:25
    [DoS attack: ACK Scan] from source 13.35.7.40,port 443 Wednesday, Jun 15,2022 22:25:24
    [DoS attack: ACK Scan] from source 211.21.118.138,port 443 Wednesday, Jun 15,2022 22:25:22
    [DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:19
    [DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:19
    [DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:18
    [DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:18
    [DoS attack: ACK Scan] from source 34.213.154.34,port 443 Wednesday, Jun 15,2022 22:25:17
    [DoS attack: ACK Scan] from source 35.155.91.63,port 443 Wednesday, Jun 15,2022 22:25:17
    [DoS attack: ACK Scan] from source 142.251.43.10,port 443 Wednesday, Jun 15,2022 22:25:07
    [DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:25:04
    [DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:46
    [DoS attack: ACK Scan] from source 20.198.162.76,port 443 Wednesday, Jun 15,2022 22:24:41
    [DoS attack: ACK Scan] from source 20.198.162.78,port 443 Wednesday, Jun 15,2022 22:24:41
    [DoS attack: ACK Scan] from source 17.57.145.27,port 5223 Wednesday, Jun 15,2022 22:24:41
    [DoS attack: ACK Scan] from source 162.125.35.134,port 443 Wednesday, Jun 15,2022 22:24:40
    [DoS attack: ACK Scan] from source 20.198.162.78,port 443 Wednesday, Jun 15,2022 22:24:40
    [DoS attack: ACK Scan] from source 162.125.35.134,port 443 Wednesday, Jun 15,2022 22:24:39
    [DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:38
    [DoS attack: ACK Scan] from source 20.115.3.214,port 443 Wednesday, Jun 15,2022 22:24:37
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:22:45
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:22:12
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:21:59
    [DoS attack: ACK Scan] from source 96.7.252.200,port 443 Wednesday, Jun 15,2022 22:21:46
    [DoS attack: ACK Scan] from source 35.244.184.98,port 443 Wednesday, Jun 15,2022 22:16:36
    [DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:36
    [DoS attack: ACK Scan] from source 35.244.184.98,port 443 Wednesday, Jun 15,2022 22:16:35
    [DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:35
    [DoS attack: ACK Scan] from source 35.201.74.116,port 443 Wednesday, Jun 15,2022 22:16:34
    [DoS attack: ACK Scan] from source 35.190.53.75,port 443 Wednesday, Jun 15,2022 22:16:34
    [DoS attack: ACK Scan] from source 35.201.74.116,port 443 Wednesday, Jun 15,2022 22:16:33
    [DoS attack: ACK Scan] from source 142.251.42.238,port 443 Wednesday, Jun 15,2022 22:14:36
    [DoS attack: ACK Scan] from source 18.65.3.31,port 443 Wednesday, Jun 15,2022 22:14:35
    [DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:34
    [DoS attack: ACK Scan] from source 142.251.42.232,port 443 Wednesday, Jun 15,2022 22:14:34
    [DoS attack: ACK Scan] from source 18.65.3.31,port 443 Wednesday, Jun 15,2022 22:14:34
    [DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:33
    [DoS attack: ACK Scan] from source 142.251.42.232,port 443 Wednesday, Jun 15,2022 22:14:33
    [DoS attack: ACK Scan] from source 18.65.216.37,port 443 Wednesday, Jun 15,2022 22:14:32
    [DoS attack: ACK Scan] from source 170.114.14.75,port 443 Wednesday, Jun 15,2022 22:13:56
    [DoS attack: ACK Scan] from source 172.217.163.42,port 443 Wednesday, Jun 15,2022 22:13:38
    [DoS attack: ACK Scan] from source 13.225.173.34,port 443 Wednesday, Jun 15,2022 22:13:37
    [DoS attack: ACK Scan] from source 172.217.163.42,port 443 Wednesday, Jun 15,2022 22:13:37
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.10,port 137 Wednesday, Jun 15,2022 22:13:18
    [DoS attack: NetBiosReplyDrop] from source 192.168.1.10,port 137 Wednesday, Jun 15,2022 22:13:08
    [DoS attack: ACK Scan] from source 20.197.71.89,port 443 Wednesday, Jun 15,2022 22:13:07
    [DoS attack: ACK Scan] from source 170.114.15.49,port 443 Wednesday, Jun 15,2022 22:13:05
    [DoS attack: ACK Scan] from source 17.57.145.27,port 5223 Wednesday, Jun 15,2022 22:13:04
    [DoS attack: ACK Scan] from source 8.252.189.122,port 443 Wednesday, Jun 15,2022 22:12:37

    • microchip8's avatar
      microchip8
      Master
      Most are false positives. NETGEAR is known and famous about that. Disable DoS protection if your Internet drops
      • jackylee0908's avatar
        jackylee0908
        Aspirant

        I found an interested thing:

        [LAN access from remote] from 193.233.191.181 port 52803 to 192.168.1.5 port 5000 Thursday, Jun 16,2022 06:52:50

        The IP was reserved for my Synology NAS device but actually it was not powered up for long time, does that mean somebody want to connect my NAS?