NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Newfiedrool
Aug 31, 2020Virtuoso
Missing log Entries on RAX120 latest firmware
Hi
im running the latest firmware on my RAX120 and have noticed missing entries on the logs.
my example shows a weeks worth of missing entries.
admin login] from source 192.168.1.7, Saturday, August 29, 2020 08:20:29
[DoS Attack: SYN/ACK Scan] from source: 51.79.183.171, port 55901, Saturday, August 29, 2020 07:42:29
[DoS Attack: TCP/UDP Echo] from source: 141.212.123.212, port 45804, Saturday, August 29, 2020 07:22:14
[DHCP IP: 192.168.1.2][Device Name: ] to MAC address 00:04:4b:%:%:%, Saturday, August 29, 2020 07:10:27
[DHCP IP: 192.168.1.14][Device Name: ] to MAC address bc:60:a7:%:%:%, Saturday, August 29, 2020 07:06:53
[DoS Attack: RST Scan] from source: 3.11.183.67, port 443, Saturday, August 29, 2020 06:11:14
[DoS Attack: RST Scan] from source: 3.11.183.67, port 443, Saturday, August 29, 2020 05:18:32
[DoS Attack: RST Scan] from source: 183.81.6.209, port 55997, Saturday, August 29, 2020 04:26:23
[DoS Attack: SYN/ACK Scan] from source: 35.198.74.25, port 22, Saturday, August 22, 2020 19:54:08
2 Replies
Sort By
- KillhippieProdigy
Having the same issue myself. This is what my logs look like, and this is also on a clean install, which didnt fire up the router setup page either, I had to go and find routerlogin myself where as other firmwares it automatically starts the setup page.
Here are my corrupt logs.
[admin login] from source xxx.xxx.x.x, Saturday, August 29, 2020 08:06:55
[DHCP IP: xxx.xxx.x.x][Device Name: ] to MAC address xx:xx.xx.xx.xx.xx, Saturday, August 29, 2020 08:02:47
[DoS Attack: SYN/ACK Scan] from source: 51.79.188.86, port 30120, Saturday, August 29, 2020 07:37:01
[DoS Attack: SYN/ACK Scan] from source: 198.44.251.161, port 80, Saturday, August 29, 2020 07:36:55
[DoS Attack: SYN/ACK Scan] from source: 51.79.188.86, port 30120, Saturday, August 29, 2020 07:36:55
[DHCP IP: 192.168.1.2][Device Name: xxxxxxxxxxx] to MAC address xx:xx.xx.xx.xx.xx, Saturday, August 29, 2020 07:24:39
[DHCP IP: 192.168.1.10][Device Name: xxxxxxxxxxx] to MAC address xx:xx.xx.xx.xx.xx, Saturday, August 29, 2020 07:24:18
[DoS Attack: TCP/UDP Echo] from source: 141.212.123.210, port 59122, Saturday, August 29, 2020 07:14:06
[DoS Attack: SYN/ACK Scan] from source: 34.68.90.188, port 80, Wednesday, August 26, 2020 00:27:29
[DoS Attack: SYN/ACK Scan] from source: 185.18.52.94, port 80, Wednesday, August 26, 2020 00:19:31
[DoS Attack: SYN/ACK Scan] from source: 185.18.52.94, port 80, Wednesday, August 26, 2020 00:07:57 - Christian_RNETGEAR Employee Retired
Hi Newfiedrool & Killhippie,
Thanks again for reaching out to me and bringing this up. I've forwarded it to our engineering team for review.
Regards,
Christian