NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Dbar918's avatar
Dbar918
Aspirant
Aug 23, 2023

Upstream and downstream locked to one channel each but internet won't connect

My CM1000 has solid amber LED lights for upstream and downstream, but the internet light is blinking green and I do not have a connection. I have verified with my provider multiple times and they told me that the modem is registered and there are no service issues at my address. This exact scenario has happened a dozen times over the past month and each instance lasts for hours. Today the router has been trying to connect for over 12 hours with no luck. I have restarted it 3 times, and I have tried 3 factory resets in the past without success. Usually I wait hours to over a day for it to fix itself and use phone data, but school has started up and I can't just wait anymore. The modem is refurbished from Amazon, but 8/10 days there are zero issues

Thanks

6 Replies

    • Dbar918's avatar
      Dbar918
      Aspirant
      Thanks, here is a sample of the log since it's way too long for the post character limit. If the whole thing is needed I can upload it as a file tomorrow.
      Also I live in an apartment so I can't access the coax cable other than the wall port, but there are two ports in my unit and they have the same problem.

      [admin login] from source 192.168.1.11
      [admin login] from source 192.168.1.4
      [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b
      [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [Internet connected] IP address: 192.168.100.10
      [DHCP IP: 192.168.1.11][Device Name: ZENFONE-9] to MAC address 06:0a:1f:a0:bf:70
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.11][Device Name: ZENFONE-9] to MAC address 06:0a:1f:a0:bf:70
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.2][Device Name: XBOX-SYSTEMOS] to MAC address 50:1a:c5:d1:d3:c5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.11][Device Name: ZENFONE-9] to MAC address 06:0a:1f:a0:bf:70
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      [DHCP IP: 192.168.1.8][Device Name: ] to MAC address b2:8c:c2:7d:2b:1e
      • Dbar918's avatar
        Dbar918
        Aspirant
        While browsing the logs I saw something that seems concerning, but I really don't know much h so maybe it's nothing. Here's a sample:

        DoS Attack: RST Scan] from source: 217.117.29.77, port 37873, Friday, August 18, 2023 09:32:36
        [DoS Attack: SYN/ACK Scan] from source: 135.125.78.175, port 1237, Friday, August 18, 2023 09:08:56
        [DHCP IP: 192.168.1.2][Device Name: XBOX-SYSTEMOS] to MAC address 50:1a:c5:d1:d3:c5, Friday, August 18, 2023 09:07:31
        [DoS Attack: RST Scan] from source: 17.248.195.72, port 443, Friday, August 18, 2023 09:06:20
        [DoS Attack: SYN/ACK Scan] from source: 162.19.170.45, port 25565, Friday, August 18, 2023 09:03:57
        [DoS Attack: ACK Scan] from source: 185.224.128.184, port 29583, Friday, August 18, 2023 08:58:11
        [DoS Attack: RST Scan] from source: 17.57.172.11, port 443, Friday, August 18, 2023 08:48:34
        [DoS Attack: RST Scan] from source: 17.253.127.202, port 443, Friday, August 18, 2023 08:31:38
        [DoS Attack: RST Scan] from source: 17.252.196.22, port 443, Friday, August 18, 2023 08:31:33
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:57
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:56
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:56
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:56
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:55
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:55
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:55
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:54
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:54
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:54
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:51
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:50
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:50
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:50
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:49
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:49
        [DoS Attack: ACK Scan] from source: 162.254.199.181, port 27033, Friday, August 18, 2023 08:22:49
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 443, Friday, August 18, 2023 08:22:48
        [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27034, Friday, August 18, 2023 08:22:48
        [DoS Attack: RST Scan] from source: 23.218.232.163, port 443, Friday, August 18, 2023 08:22:36
        [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b, Friday, August 18, 2023 08:21:44
        [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b, Friday, August 18, 2023 08:19:39
        [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b, Friday, August 18, 2023 08:19:14
        [DoS Attack: RST Scan] from source: 18.162.43.220, port 80, Friday, August 18, 2023 08:13:39
        [DoS Attack: RST Scan] from source: 17.36.206.4, port 443, Friday, August 18, 2023 07:51:30
        [DoS Attack: ACK Scan] from source: 194.45.197.222, port 30120, Friday, August 18, 2023 07:43:44
        [DoS Attack: SYN/ACK Scan] from source: 162.19.170.45, port 25565, Friday, August 18, 2023 07:29:46
        [DoS Attack: SYN/ACK Scan] from source: 135.125.78.175, port 1237, Friday, August 18, 2023 07:24:25
        [DoS Attack: RST Scan] from source: 17.57.12.16, port 443, Friday, August 18, 2023 07:21:30
        [DoS Attack: SYN/ACK Scan] from source: 162.19.170.56, port 25565, Friday, August 18, 2023 07:17:34
        [DoS Attack: SYN/ACK Scan] from source: 193.42.12.170, port 55926, Friday, August 18, 2023 07:10:34
        [DoS Attack: RST Scan] from source: 17.57.12.243, port 443, Friday, August 18, 2023 06:47:47
        [DoS Attack: RST Scan] from source: 17.253.127.211, port 443, Friday, August 18, 2023 06:47:05
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:09
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:09
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:08
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:08
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:07
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:07
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:06
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:06
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:05
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:04
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:04
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:03
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:03
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:02
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:02
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:01
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:01
        [DoS Attack: ACK Scan] from source: 162.254.199.163, port 27021, Friday, August 18, 2023 06:42:00
        [DoS Attack: ACK Scan] from source: 155.133.253.34, port 27036, Friday, August 18, 2023 06:42:00
        [DoS Attack: RST Scan] from source: 17.36.206.5, port 443, Friday, August 18, 2023 06:39:51
        [DoS Attack: RST Scan] from source: 52.70.183.252, port 443, Friday, August 18, 2023 06:39:27
        [DoS Attack: RST Scan] from source: 52.70.183.252, port 443, Friday, August 18, 2023 06:39:27
        [DoS Attack: RST Scan] from source: 52.70.183.252, port 443, Friday, August 18, 2023 06:39:27
        [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b, Friday, August 18, 2023 06:39:11
        [DHCP IP: 192.168.1.4][Device Name: MSI] to MAC address 38:ba:f8:80:61:4b, Friday, August 18, 2023 06:39:11
        [DoS Attack: RST Scan] from source: 17.252.196.22, port 443, Friday, August 18, 2023 06:37:53
        [DoS Attack: RST Scan] from source: 17.36.206.5, port 443, Friday, August 18, 2023 06:34:11
        [DHCP IP: 192.168.1.11][Device Name: ZENFONE-9] to MAC address 06:0a:1f:a0:bf:70, Friday, August 18, 2023 06:23:49
        [Internet connected] IP address: 98.172.218.202, Friday, August 18, 2023 06:23:42
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:23:10
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:22:54
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:22:38
        [DHCP IP: 192.168.1.11][Device Name: ZENFONE-9] to MAC address 06:0a:1f:a0:bf:70, Friday, August 18, 2023 06:22:24
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:22:22
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:22:06
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:21:51
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:21:35
        [Internet connected] IP address: 192.168.100.10, Friday, August 18, 2023 06:21:18
        [DHCP IP: 192.168.1.10][Device Name: PETKIT_DFOOD] to MAC address c4:5b:be:c7:16:e5, Friday, August 18, 2023 06:18:05
  • plemans's avatar
    plemans
    Guru - Experienced User

    Like FURRYe38 says, the logs and cable connections help us more. 

    You can also check your lines yourself. Its always the ISP's first response that "the line is fine"

    Start with removing any amplifiers, signal attenuators, or splitters from the coax.
    From there check the line for kinks, damage, moisture in the line.
    Check the connectors for improperly made ends, foil touching the copper coax line, loose connections, bad/old/cheap connectors, or corroded connections. Replace them if you do.
    If you can, simply connect the modem right where the coax comes into the home. This prevents wiring in the home from being the issue. And some ISP’s charge if the wiring issue is in the home. So this helps prevent this.