NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
FURRYe38
Nov 28, 2023Guru - Experienced User
New - RS700S Firmware Version 1.0.7.80 Released
Enhancements: 11/21/2023
Removes Korea/Japan/Singapore/India on supported country list.
Stability enhancement.
Galaxy Z Fold4 IOT performance enhancement.
DFS mechanism enhancement.
Bug...
TeamCorvette
Dec 01, 2023Tutor
Hi I just got this Netgear RS700 and had no issues with DoS attacks
untill 2 days ago when there was a firmware update Firmware Version V1.0.7.80_2.0.79
Small network like 15 total PCs and devices in private home where most times maybe half of these are on so router is mostly idle
As soon as this was updated these DoS attacks began and never stop
I tried blocking UDP services for ports like 4-19 but that did nothing at all to stop this
What is this sudden cause and how to correct ?
Thanks for the help. JR
Small example:
[DoS attack: RST Scan] from source 54.197.98.98,port 443 Thursday, Nov 30, 2023 20:18:56
[DHCP IP: (192.168.1.9)] to MAC address AC:E0:10:4E:60:DE, Thursday, Nov 30, 2023 20:17:26
[DoS attack: snmpQueryDrop] from source 147.203.255.20,port 58342 Thursday, Nov 30, 2023 19:57:05
[DoS attack: Fraggle Attack] from source 10.9.144.1,port 67 Thursday, Nov 30, 2023 19:55:12
[DoS attack: Fraggle Attack] from source 10.9.144.1,port 67 Thursday, Nov 30, 2023 19:54:57
[DoS attack: Fraggle Attack] from source 10.9.144.1,port 67 Thursday, Nov 30, 2023 19:54:55
[DoS attack: RST Scan] from source 95.100.155.249,port 443 Thursday, Nov 30, 2023 19:46:19
[DoS attack: RST Scan] from source 95.100.155.249,port 443 Thursday, Nov 30, 2023 19:34:19
[DHCP IP: (192.168.1.9)] to MAC address AC:E0:10:4E:60:DE, Thursday, Nov 30, 2023 19:26:11
ShadowMario3
Dec 01, 2023Luminary
I have the same issue with DoS attacks appearing in the logs even few seconds. From what support told me, it seems they are false positives. For now, I have disabled "Known DoS attacks and Port Scans" under "Include in Log" so it won't overflow the log:
Luckily, it doesn't seem to interfere with my port forwarding or internet speed.
- TeamCorvetteDec 01, 2023Tutor
Thanks for the quick reply
What they are saying is hide the fact in logs that this new firmware is not blocking DoS at a high rate per second, so really masking the problem and not knowing if those attacks are affecting the PCs and devices on my network
As it is these are coming from many different TCP/IP addresses
Did they say they are working on a fix and when that will happen
As I mentioned none of these occured with last firmware version
Thanks again . . JR
- TeamCorvetteDec 01, 2023Tutor
also I checked the address and shows it comes way over in Oregon and I am in Texas so clearly the DoS are not false positives I would think ?
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:44:26
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:44:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:43:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:42:24
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:41:23
[DHCP IP: (192.168.1.9)] to MAC address AC:E0:10:4E:60:DE, Thursday, Nov 30, 2023 21:41:02
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:40:23
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:40:22
[DoS attack: RST Scan] from source 213.246.109.33,port 443 Thursday, Nov 30, 2023 21:30:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:30:17
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:30:11
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:29:38
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:29:37
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:28:37
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:28:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:27:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:26:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:24:14
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:24:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:23:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:22:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:22:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:21:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:20:09
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:42
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:18:49
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:17:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:17:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:34
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:15:22
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:15:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:29
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:08
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:57
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:11
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:08:21
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:07:21
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:07:20
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:04:19
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:04:18
[DoS attack: RST Scan] from source 192.145.239.223,port 2096 Thursday, Nov 30, 2023 21:04:03
[DoS attack: RST Scan] from source 192.145.239.223,port 2096 Thursday, Nov 30, 2023 21:03:56
[Log Cleared] Thursday, Nov 30, 2023 21:03:38- microchip8Dec 01, 2023Master
It's a false positive, coming from Amazon. Regardless if it's in Oregon or somewhere else. Location doesn't matter.