NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
FURRYe38
Nov 28, 2023Guru - Experienced User
New - RS700S Firmware Version 1.0.7.80 Released
Enhancements: 11/21/2023
Removes Korea/Japan/Singapore/India on supported country list.
Stability enhancement.
Galaxy Z Fold4 IOT performance enhancement.
DFS mechanism enhancement.
Bug...
ShadowMario3
Nov 30, 2023Luminary
I have the same issue with DoS attacks appearing in the logs even few seconds. From what support told me, it seems they are false positives. For now, I have disabled "Known DoS attacks and Port Scans" under "Include in Log" so it won't overflow the log:
Luckily, it doesn't seem to interfere with my port forwarding or internet speed.
TeamCorvette
Nov 30, 2023Tutor
Thanks for the quick reply
What they are saying is hide the fact in logs that this new firmware is not blocking DoS at a high rate per second, so really masking the problem and not knowing if those attacks are affecting the PCs and devices on my network
As it is these are coming from many different TCP/IP addresses
Did they say they are working on a fix and when that will happen
As I mentioned none of these occured with last firmware version
Thanks again . . JR
- TeamCorvetteNov 30, 2023Tutor
also I checked the address and shows it comes way over in Oregon and I am in Texas so clearly the DoS are not false positives I would think ?
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:44:26
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:44:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:43:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:42:24
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:41:23
[DHCP IP: (192.168.1.9)] to MAC address AC:E0:10:4E:60:DE, Thursday, Nov 30, 2023 21:41:02
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:40:23
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:40:22
[DoS attack: RST Scan] from source 213.246.109.33,port 443 Thursday, Nov 30, 2023 21:30:25
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:30:17
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:30:11
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:29:38
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:29:37
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:28:37
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:28:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:27:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:26:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:24:14
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:24:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:23:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:22:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:22:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:21:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:20:09
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:42
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:19:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:18:49
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:17:36
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:17:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:35
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:34
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:16:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:15:22
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:15:13
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:29
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:14:08
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:57
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:12
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:13:11
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:08:21
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:07:21
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:07:20
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:04:19
[DoS attack: RST Scan] from source 52.89.243.158,port 443 Thursday, Nov 30, 2023 21:04:18
[DoS attack: RST Scan] from source 192.145.239.223,port 2096 Thursday, Nov 30, 2023 21:04:03
[DoS attack: RST Scan] from source 192.145.239.223,port 2096 Thursday, Nov 30, 2023 21:03:56
[Log Cleared] Thursday, Nov 30, 2023 21:03:38- microchip8Nov 30, 2023Master
It's a false positive, coming from Amazon. Regardless if it's in Oregon or somewhere else. Location doesn't matter.
- BH_CDec 01, 2023NETGEAR Expert
Without looking into details, we cannot tell if each individual case is a real attack or not.
What we can say is, after the NAT loopback issue from the previous releases (e.g. v1.0.7.66) is fixed, it introduced some false alarms in the DoS attack detection. We still work on the fix and will release the fixed firmware soon.
- TeamCorvetteDec 01, 2023Tutor
When I received this RS700 2 weeks ago I checked the Netgear website and said a firmware update was needed so I downloaded and installed it and show version was V1.0.7.66
For that 2 weeks not 1 DoS was shown in logs until
the auto firmware update 2 days ago and as I mentioned the IP addresses and DoS types are many different ones and several per second showing in logs
Great to see your looking to correct this ASAP as real or false still has to have a cost to the router as processer, memory, bandwidth, downstream to nodes, etc