Reply
Highlighted
Apprentice

RAX120 Firmware Version 1.0.1.108

New Features and Enhancements:
•Supports the Tx Beamforming option under Advanced > Wireless Settings to improve legacy wireless client support.

Bug Fixes:
•Wireless disconnection when WiFi password authentication failed.
•Internet and Wireless menu links under the Basic tab do not work properly.
•The attached device list in the Nighthawk app does not display any devices.
•Fixes minor web UI issues.

https://community.netgear.com/t5/forums/postpage/board-id/en-home-routers-nighthawk-wifi-ax6

Nighthawk AX12[RAX120]
Nighthawk X10[R9000]
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 1 of 37
Highlighted
Apprentice

Re: RAX120 Firmware Version 1.0.1.108

https://www.netgear.com/support/product/RAX120.aspx#download

Nighthawk AX12[RAX120]
Nighthawk X10[R9000]
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 2 of 37
Highlighted
Aspirant

Re: RAX120 Firmware Version 1.0.1.108

Any issues with the new firmware?

Message 3 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

Yes, I had the RAX120 with 1.0.1.108 freeze up on me when attempting to connect via wireless with my MacBook 15".  I powered off, turned off AX and connected back ok.  Was working all day without issue up until that point.  All devices lost connection when I attempted with the laptop.  Never had any issues like that previously.

 

After flashing 1.0.1.108 I did a hard reset before I started using it this morning.  AX was on and OFDMA was on for 5GHz network that the laptop was connecting to.

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 4 of 37
Highlighted
Apprentice

Re: RAX120 Firmware Version 1.0.1.108


@nighthawkr wrote:

Yes, I had the RAX120 with 1.0.1.108 freeze up on me when attempting to connect via wireless with my MacBook 15".  I powered off, turned off AX and connected back ok.  Was working all day without issue up until that point.  All devices lost connection when I attempted with the laptop.  Never had any issues like that previously.

 

After flashing 1.0.1.108 I did a hard reset before I started using it this morning.  AX was on and OFDMA was on for 5GHz network that the laptop was connecting to.


See any updated Driver for your Wireless Network Card? I didn't experience any issue so far...

https://www.driverscloud.com/en/features

Nighthawk AX12[RAX120]
Nighthawk X10[R9000]
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 5 of 37
Highlighted
Apprentice

Re: RAX120 Firmware Version 1.0.1.108


@jimlenz wrote:

Any issues with the new firmware?


No

Nighthawk AX12[RAX120]
Nighthawk X10[R9000]
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 6 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

macOS is up to date on my 2018 MacBook 15" with Catalina.  It started that I could not authenticate with wireless password (even though it hadn't changed) and then the whole network stopped working.  Could not connect via wired from my other device (PC) to 10.0.0.1 to check on the device status, so had to reset.

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 7 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

I’ve had loss of Internet connectivity and massive ping spikes minutes before that happens. This with an Intel AX200 client and also an iPhone 8 Plus. I found it far more stable with all AX features disabled. Currently working with NG to solve the issue.
Message 8 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

I personally had this issue since the beginning, starting with the original factory firmware all the way to the newest. I’m guessing some sort of fall back or chipset compatibility issues that need sorting on Qualcomm’s side via a newer WiFi chipset firmware. Broadcom seems to have bigger issues in its chipsets.
Message 9 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

Update: Currently working with MacBook now on 5GHz with AX enabled, OFDMA enabled on both bands (prev only 5GHz), disable PMF checked.  No logs unfortunately.  Will see how it goes.

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 10 of 37
Highlighted
Aspirant

Re: RAX120 Firmware Version 1.0.1.108

Just done this update all WiFi showing products online but nothing is connecting and no internet in the house
Message 11 of 37
Highlighted
Aspirant

Re: RAX120 Firmware Version 1.0.1.108

Just done this update all WiFi showing products online but nothing is connecting and no internet in the house
Just shows off line have I missed something
Message 12 of 37
Highlighted
Aspirant

Re: RAX120 Firmware Version 1.0.1.108

Please see this pic hope this can help
Message 13 of 37
Highlighted
Apprentice

Re: RAX120 Firmware Version 1.0.1.108


@Daveblade93 wrote:
Please see this pic hope this can help

Did you do hard reset after FW update?

Nighthawk AX12[RAX120]
Nighthawk X10[R9000]
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 14 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

Since the update is anyone seeing a flood of SYN/ACK DoS attacks from 148.251.48.231?
 I have had hundreds atarting last week, pretty much when the firmware was released and I updated. According to my ISP its something the router is calling out for, or its a vulnerabilty in the new firmware. That seems a bit dramatic but then again this amount of scans is not fun and its a cut down version.

[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:34
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:25
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:16
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:51:37
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:51:28
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December
01, 2019 21:59:43
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:27:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:14:36
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:01:22
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:55:03
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:49:09
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:03:35
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:03:23
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:58:15
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:44:19
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:22:53
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:03:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:52:41
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:41:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:11:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:53:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:37:44
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:00:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 16:42:37
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 16:37:45
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 15:51:01
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 15:27:52
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:55:31
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:52:55
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:41:14

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 15 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

I personally disable the DDoS Protection option, quite often I’ve seen legitimate servers being falsely detected for DDoS ie, Amazon AWS, Apple, Google and many others. In fact some have had issues with this on previous NG models where disabling that feature allowed certain apps/sites to work properly.

Message 16 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

Hello avtella while I totally agree about Netgear logs this particular site is known for not being a good actor I had a message from a few people pointing to a couple of sites that show Hetzner as being an abusive IP address, and they're going for a really odd port which is 50002 which is generally used for some software I've never heard of which is PPoiP I've had literally hundreds well actually into the thousands now since I've booted the router from that IP  even when cold booting with no devices attached or Wi-Fi device is turned on so literally it's just the route of sitting there and it starts almost instantly the router boots ieven before it gets the time from the NTP server it starts getting attacked, there is another conversation on these forums with people with Orbi devices RBK50s I think which are having similar issues.

 
 It's just odd that they're both had recent firmware updates for these routers and they're both Qualcomm devices also it's happening in America the UK Australia all over the world tbh and something just doesn't feel right if that makes sense about this, and my ISP said they think it's the router calling for something from this IP or there is possibly a security issue that people are not aware of, I don't see it being the latter because the router is stopping it but it is odd that it just started with the update, of course that could just be coincidence. If you do happen to see logs from this particular IP and believe me they I have as I said have thousands within 24 hours I've never seen so many I'm wondering if it's something in the latest firmware, or of course someone could've see accessed one of the servers at Hetzner and are just being a bad actor. 
https://www.abuseipdb.com/check/148.251.48.231

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 17 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

I contacted Hetzner the company behind the IP address and informed them of what is happening, as not all large server farms are aware that the maybe they've lost control of one of there devices. They've replied to me stating the following;

 

'We have received your information regarding spam and/or abuse and we shall follow up on this matter.
The person responsible has been sent the following instructions:
- Solve the issue
- Send us a response'

 

so hopefully this quite large-scale scan attack will cease and desist within the next day also. 

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 18 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

I'm constantly getting hit with ddos attacks on my router. It's getting to where it's not worth keeping anymore. We'll need another firmware update or another patch fix asap. This has been going on for just over a month now.
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 19 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

I'm getting the same issues with the ddos attacks. Mine are non-stop. This has been going on for just over a month now. I'm about ready to take this back and go back with a Asus Tri-Band router that I had before this. This rax120 is a total mess!
Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 20 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

I don't see any dos entries in my recent logs, but I'm watching now.

Model: RAX120|Nighthawk AX12 12-Stream WiFi Router
Message 21 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

You'll know the second it starts, all traffic stops and it will restart and possibly a restart loop.
Message 22 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

Hers a short list from this morning.

[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 06:34:27
[admin login] from source 10.0.0.5, Monday, January 13, 2020 06:34:25
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:54:25
[DoS Attack: SYN/ACK Scan] from source: 164.68.120.93, port 80, Monday, January 13, 2020 04:52:53
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:49:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 04:45:30
[DoS Attack: ACK Scan] from source: 162.125.19.131, port 443, Monday, January 13, 2020 04:45:15
[DoS Attack: ACK Scan] from source: 162.125.19.131, port 443, Monday, January 13, 2020 04:44:44
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:44:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 04:44:16
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:24:25
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53849, Monday, January 13, 2020 04:22:02
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53694, Monday, January 13, 2020 04:20:57
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53691, Monday, January 13, 2020 04:20:57
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53690, Monday, January 13, 2020 04:20:57
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 03:29:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 03:24:28
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 03:14:25
[DHCP IP: 10.0.0.14] to MAC address d4:4d:a4:49:d9:b6, Monday, January 13, 2020 03:13:17
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:44:25
[DoS Attack: SYN/ACK Scan] from source: 43.228.64.68, port 2287, Monday, January 13, 2020 02:41:50
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:29:25
[DoS Attack: SYN/ACK Scan] from source: 198.13.104.177, port 80, Monday, January 13, 2020 02:24:33
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:19:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 02:16:42
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 01:49:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 01:44:35
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 01:19:25
[DHCP IP: 10.0.0.5] to MAC address c6:f3:9b:c6:b7:4f, Monday, January 13, 2020 01:17:17
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:34:23
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:25
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:29:23
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:13
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:07
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:04
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:19:23
[DoS Attack: SYN/ACK Scan] from source: 52.220.131.108, port 443, Monday, January 13, 2020 00:17:00
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:09:23
[DHCP IP: 10.0.0.4] to MAC address dc:54:d7:0e:86:a9, Monday, January 13, 2020 00:09:13
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 23:39:22
[DoS Attack: Ascend Kill] from source: 89.248.168.217, port 34653, Sunday, January 12, 2020 23:37:22
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:29:19
[DoS Attack: SYN/ACK Scan] from source: 23.213.96.39, port 443, Sunday, January 12, 2020 22:25:00
[DoS Attack: SYN/ACK Scan] from source: 23.213.96.39, port 443, Sunday, January 12, 2020 22:24:44
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:24:19
[Access Control] Device GALAXYWATCHACTIVE2-CE68 with MAC address C0Smiley Very HappyCSmiley Very HappyA:E3:9E:69 is allowed, Sunday, January 12, 2020 22:23:39
[DHCP IP: 10.0.0.10] to MAC address c0:dc:da:e3:9e:69, Sunday, January 12, 2020 22:23:39
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:19:19
Message 23 of 37
Highlighted
Prodigy

Re: RAX120 Firmware Version 1.0.1.108

I usually keep DDoS protection off, even Asus if I recall actually has it off by default. In my experience it’s been mostly false positives and has actually caused reduced performance for all connected clients at times with certain devices active.
Message 24 of 37
Highlighted

Re: RAX120 Firmware Version 1.0.1.108

When this happens, it stops the wifi and restarts the router and yesterday, it put the router in a restart loop. I had to reset to factory and reapply the firmware.
Message 25 of 37
Top Contributors
Discussion stats
  • 36 replies
  • 2987 views
  • 8 kudos
  • 8 in conversation
Announcements