Reply

Re: Ethernet cuts out for a few seconds and is getting worse

SicilianAngel96
Aspirant

Ethernet cuts out for a few seconds and is getting worse

Hello

My Ethernet cuts out frequently mostly when playing games like ARK, Destiny 2, League of Legends, and other games. I have gotten in contact with technical support 3 times yet nothing has completely fixed the issue. I thought it was due to packet loss but that was resolved and somehow, things got worse today. I am unsure what to do and tech support says if it consists, it might be a hardware issue. I am with Xfinity and on their 100MBPS deal. Please help. I'm getting very upset with how this keeps going. 

Model: R9000|Nighthawk X10 AD7200 Smart WiFi Router
Message 1 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

I have run a regular speed test and the download speed is 19.3mbps and the upload speed is 22.3mbps.

The Comcast speed test dowload speed is 60.44mbps and the upload speed is 24.15mbps. 

Message 2 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

I got the first speed test right off Google and used the Comcast speed test they have avalible as the second. 

Also, I know for certain Parental Controls are disabled but I'm unsure how to gte to the other 3. Can you please tell me how to reach them?

Message 3 of 10
IrvSp
Master

Re: Ethernet cuts out for a few seconds and is getting worse

Have you looked at the Router Log? Does it show Internet Disconnects?

 

Have you looked at the Modem logs?

Message 4 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

Here's the logs from yesterday. Maybe it can help. Sorry for it being so long: 

 

[DoS Attack: ACK Scan] from source: 138.186.77.153, port 1036, Tuesday, March 20, 2018 04:48:18
[DoS Attack: ACK Scan] from source: 138.186.78.217, port 34786, Tuesday, March 20, 2018 04:14:55
[DoS Attack: ACK Scan] from source: 138.118.177.34, port 55449, Tuesday, March 20, 2018 01:55:42
[DoS Attack: TCP/UDP Chargen] from source: 101.100.146.139, port 52737, Tuesday, March 20, 2018 01:54:51
[DoS Attack: ACK Scan] from source: 75.126.8.23, port 5222, Tuesday, March 20, 2018 01:41:30
[DHCP IP: 192.168.1.2][Device Name: AMAZON-87965585B] to MAC address 50:dc:e7:2a:bd:53, Tuesday, March 20, 2018 01:20:27
[DHCP IP: 192.168.1.17][Device Name: AMAZON-59DBECD67] to MAC address 6c:56:97:12:36:c5, Tuesday, March 20, 2018 01:20:26
[DHCP IP: 192.168.1.8][Device Name: AMAZON-001EED142] to MAC address 40:b4:cd:06:88:17, Tuesday, March 20, 2018 01:20:15
[DHCP IP: 192.168.1.5][Device Name: IPHONE] to MAC address b0:48:1a:26:dd:d8, Tuesday, March 20, 2018 01:20:13
[DHCP IP: 192.168.1.19][Device Name: CHROMECAST] to MAC address 6c:ad:f8:2f:cd:51, Tuesday, March 20, 2018 01:20:12
[DHCP IP: 192.168.1.6][Device Name: IPHONE] to MAC address 70:81:eb:96:2e:ef, Tuesday, March 20, 2018 01:20:08
[DHCP IP: 192.168.1.6][Device Name: IPHONE] to MAC address 70:81:eb:96:2e:ef, Tuesday, March 20, 2018 01:17:32
[DoS Attack: TCP/UDP Chargen] from source: 209.126.136.5, port 36745, Tuesday, March 20, 2018 01:06:05
[DHCP IP: 192.168.1.19][Device Name: CHROMECAST] to MAC address 6c:ad:f8:2f:cd:51, Tuesday, March 20, 2018 00:20:44
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Tuesday, March 20, 2018 00:02:18
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Monday, March 19, 2018 23:49:24
[DoS Attack: ACK Scan] from source: 138.118.179.186, port 54995, Monday, March 19, 2018 23:40:09
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Monday, March 19, 2018 23:38:10
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 23:36:44
[DoS Attack: ACK Scan] from source: 93.184.215.217, port 443, Monday, March 19, 2018 23:33:46
[DoS Attack: ACK Scan] from source: 40.77.229.46, port 443, Monday, March 19, 2018 23:33:23
[DoS Attack: ACK Scan] from source: 93.184.215.217, port 443, Monday, March 19, 2018 23:33:22
[DoS Attack: ACK Scan] from source: 40.77.229.46, port 443, Monday, March 19, 2018 23:33:21
[DoS Attack: SYN/ACK Scan] from source: 23.1.99.237, port 443, Monday, March 19, 2018 23:32:41
[DoS Attack: ACK Scan] from source: 157.240.14.15, port 443, Monday, March 19, 2018 23:30:30
[DoS Attack: ACK Scan] from source: 157.240.14.19, port 443, Monday, March 19, 2018 23:30:21
[DoS Attack: ACK Scan] from source: 157.240.14.16, port 443, Monday, March 19, 2018 23:30:17
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:30:08
[DoS Attack: ACK Scan] from source: 157.240.14.19, port 443, Monday, March 19, 2018 23:30:00
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:58
[DoS Attack: ACK Scan] from source: 157.240.14.15, port 443, Monday, March 19, 2018 23:29:40
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:37
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:11
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 23:28:16
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 23:26:45
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 23:21:15
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 23:21:03
[DoS Attack: ACK Scan] from source: 45.7.14.124, port 37280, Monday, March 19, 2018 23:18:08
[DoS Attack: ACK Scan] from source: 138.186.76.229, port 39972, Monday, March 19, 2018 23:09:19
[DoS Attack: TCP/UDP Chargen] from source: 184.105.139.101, port 22764, Monday, March 19, 2018 23:08:54
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:56:40
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Monday, March 19, 2018 22:53:04
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:46:41
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:36:45
[DHCP IP: 192.168.1.7][Device Name: IPHONE] to MAC address 54:33:cb:f2:1f:46, Monday, March 19, 2018 22:29:36
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:26:49
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:16:27
[DoS Attack: SYN/ACK Scan] from source: 173.254.255.196, port 8080, Monday, March 19, 2018 22:07:09
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 22:06:45
[DoS Attack: ACK Scan] from source: 138.118.179.188, port 48318, Monday, March 19, 2018 22:06:22
[DHCP IP: 192.168.1.6][Device Name: IPHONE] to MAC address 70:81:eb:96:2e:ef, Monday, March 19, 2018 22:02:23
[DHCP IP: 192.168.1.6][Device Name: IPHONE] to MAC address 70:81:eb:96:2e:ef, Monday, March 19, 2018 22:02:23
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:57:05
[DoS Attack: ACK Scan] from source: 208.66.239.90, port 443, Monday, March 19, 2018 21:55:59
[DoS Attack: ACK Scan] from source: 208.66.239.90, port 443, Monday, March 19, 2018 21:53:13
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:36:33
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:26:21
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:16:44
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:16:09
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:13:30
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:08:18
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:06:16
[DoS Attack: RST Scan] from source: 219.92.244.157, port 64706, Monday, March 19, 2018 21:02:50
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:56:13
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 20:50:40
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:46:04
[DoS Attack: ACK Scan] from source: 138.186.76.72, port 5980, Monday, March 19, 2018 20:45:50
[DoS Attack: ACK Scan] from source: 138.118.177.142, port 12949, Monday, March 19, 2018 20:40:19
[DoS Attack: ACK Scan] from source: 138.186.79.194, port 51155, Monday, March 19, 2018 20:37:37
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:25:46
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:15:48
[DoS Attack: ACK Scan] from source: 131.253.34.233, port 443, Monday, March 19, 2018 20:06:11
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:06:10
[DoS Attack: ACK Scan] from source: 131.253.34.233, port 443, Monday, March 19, 2018 20:06:10
[Time synchronized with NTP server] Monday, March 19, 2018 20:04:30
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:03:30
[DoS Attack: ACK Scan] from source: 144.202.3.29, port 443, Monday, March 19, 2018 20:03:18
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:03:15
[Internet connected] IP address: 73.107.82.57, Monday, March 19, 2018 20:03:07
[Internet disconnected] Monday, March 19, 2018 20:02:57
[admin login] from source 192.168.1.4, Monday, March 19, 2018 20:02:41
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:01:57
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:01:26
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 20:01:05
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 19:56:06
[DoS Attack: ACK Scan] from source: 138.186.76.146, port 41590, Monday, March 19, 2018 19:48:53
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 19:45:51
[DoS Attack: ACK Scan] from source: 138.186.76.221, port 63247, Monday, March 19, 2018 19:37:16
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 19:36:09
[DoS Attack: ACK Scan] from source: 40.77.229.37, port 443, Monday, March 19, 2018 19:35:53
[DoS Attack: ACK Scan] from source: 208.78.164.14, port 27020, Monday, March 19, 2018 19:33:24
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 19:32:14
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 19:32:13
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 19:31:26
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 19:30:51
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 19:26:37
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 19:26:24
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 19:25:51
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 19:05:59
[DoS Attack: ACK Scan] from source: 138.186.77.230, port 63246, Monday, March 19, 2018 19:02:26
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 18:55:38
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 18:45:24
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 18:35:36
[DHCP IP: 192.168.1.19][Device Name: CHROMECAST] to MAC address 6c:ad:f8:2f:cd:51, Monday, March 19, 2018 18:31:04
[DHCP IP: 192.168.1.19][Device Name: CHROMECAST] to MAC address 6c:ad:f8:2f:cd:51, Monday, March 19, 2018 18:30:22
[DoS Attack: ACK Scan] from source: 157.240.14.63, port 443, Monday, March 19, 2018 18:26:12
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 18:25:32
[DoS Attack: ACK Scan] from source: 198.38.124.152, port 443, Monday, March 19, 2018 18:23:46
[admin login] from source 192.168.1.4, Monday, March 19, 2018 18:23:32
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 18:15:44
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 17:55:44
[DoS Attack: SYN/ACK Scan] from source: 196.52.2.41, port 80, Monday, March 19, 2018 17:55:18
[DHCP IP: 192.168.1.12][Device Name: ] to MAC address 58:91:cf:6f:d4:cf, Monday, March 19, 2018 17:38:25
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 17:35:39
[DoS Attack: SYN/ACK Scan] from source: 151.101.5.124, port 80, Monday, March 19, 2018 17:27:28
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 17:25:30
[DoS Attack: ACK Scan] from source: 138.186.77.232, port 25667, Monday, March 19, 2018 17:25:21
[DHCP IP: 192.168.1.6][Device Name: IPHONE] to MAC address 70:81:eb:96:2e:ef, Monday, March 19, 2018 17:20:11
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 17:15:19
[DHCP IP: 192.168.1.3][Device Name: ALYSSAS-IPAD] to MAC address e0:66:78:5b:f3:c1, Monday, March 19, 2018 17:12:15
[DoS Attack: ACK Scan] from source: 162.254.196.84, port 27021, Monday, March 19, 2018 17:10:53
[DoS Attack: ACK Scan] from source: 162.254.195.45, port 443, Monday, March 19, 2018 17:10:53
[DoS Attack: ACK Scan] from source: 162.254.193.7, port 27021, Monday, March 19, 2018 17:10:52
[DoS Attack: ACK Scan] from source: 162.254.193.46, port 27020, Monday, March 19, 2018 17:10:52
[DoS Attack: ACK Scan] from source: 162.254.196.84, port 27021, Monday, March 19, 2018 17:10:52
[DoS Attack: ACK Scan] from source: 162.254.195.45, port 443, Monday, March 19, 2018 17:10:52
[DoS Attack: ACK Scan] from source: 162.254.193.7, port 27021, Monday, March 19, 2018 17:10:51
[DoS Attack: ACK Scan] from source: 162.254.193.46, port 27020, Monday, March 19, 2018 17:10:51
[DoS Attack: ACK Scan] from source: 162.254.196.84, port 27021, Monday, March 19, 2018 17:10:51
[DoS Attack: ACK Scan] from source: 162.254.195.45, port 443, Monday, March 19, 2018 17:10:51
[DoS Attack: ACK Scan] from source: 162.254.193.46, port 27020, Monday, March 19, 2018 17:10:47
[DoS Attack: ACK Scan] from source: 162.254.196.84, port 27021, Monday, March 19, 2018 17:10:47
[DoS Attack: ACK Scan] from source: 162.254.195.45, port 443, Monday, March 19, 2018 17:10:47
[DoS Attack: ACK Scan] from source: 162.254.193.7, port 27021, Monday, March 19, 2018 17:10:46
[DoS Attack: ACK Scan] from source: 162.254.193.46, port 27020, Monday, March 19, 2018 17:10:46
[DoS Attack: ACK Scan] from source: 162.254.196.84, port 27021, Monday, March 19, 2018 17:10:46
[DoS Attack: ACK Scan] from source: 162.254.195.45, port 443, Monday, March 19, 2018 17:10:46
[DoS Attack: ACK Scan] from source: 162.254.193.7, port 27021, Monday, March 19, 2018 17:10:45
[DoS Attack: ACK Scan] from source: 162.254.193.46, port 27020, Monday, March 19, 2018 17:10:45
[DoS Attack: ACK Scan] from source: 138.186.79.249, port 16140, Monday, March 19, 2018 17:07:13
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 17:05:46
[DHCP IP: 192.168.1.7][Device Name: IPHONE] to MAC address 54:33:cb:f2:1f:46, Monday, March 19, 2018 16:57:05
[Time synchronized with NTP server] Monday, March 19, 2018 16:56:09
[DoS Attack: ACK Scan] from source: 54.192.83.170, port 443, Monday, March 19, 2018 16:56:05
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 16:55:40
[DHCP IP: 192.168.1.13][Device Name: AMAZON-E0A275A3B] to MAC address fc:65:de:a4:c2:8c, Monday, March 19, 2018 16:55:37
[DHCP IP: 192.168.1.17][Device Name: AMAZON-59DBECD67] to MAC address 6c:56:97:12:36:c5, Monday, March 19, 2018 16:55:03
[DHCP IP: 192.168.1.8][Device Name: AMAZON-001EED142] to MAC address 40:b4:cd:06:88:17, Monday, March 19, 2018 16:55:02
[DHCP IP: 192.168.1.2][Device Name: AMAZON-87965585B] to MAC address 50:dc:e7:2a:bd:53, Monday, March 19, 2018 16:54:50
[DHCP IP: 192.168.1.5][Device Name: IPHONE] to MAC address b0:48:1a:26:dd:d8, Monday, March 19, 2018 16:54:49
[DHCP IP: 192.168.1.19][Device Name: CHROMECAST] to MAC address 6c:ad:f8:2f:cd:51, Monday, March 19, 2018 16:54:35
[DHCP IP: 192.168.1.9][Device Name: WINDOWS-PHONE] to MAC address b4:e1:c4:af:8b:a8, Monday, March 19, 2018 16:54:34
[DHCP IP: 192.168.1.4][Device Name: ALYS-DESKTOP] to MAC address 48:0f:cf:c1:3a:b7, Monday, March 19, 2018 16:54:19
[Plex Net]No Network Device connect, exit, Monday, March 19, 2018 16:54:16
[Internet connected] IP address: 73.107.82.57, Monday, March 19, 2018 16:54:16
[Initialized, firmware version: V1.0.3.10] Monday, March 19, 2018 16:54:14

 

Message 5 of 10
IrvSp
Master

Re: Ethernet cuts out for a few seconds and is getting worse

@SicilianAngel96, wow, you got a LOT of possible attacks...

 

138.186.77.153, 138.186.78.217, 138.118.177.34, Lacnic, might be a game using the ports? They are almost all like that from the ones I checked?

I see Dropbox, Facebook, Blizzard Entertainment...

 

Do you have a FIREWALL and active Anti-Virus? Could one or more devices be infected?

 

Just too many attacks. I know NG logs tend to have some, usually false positives, but this appears to be TOO MANY...

 

You do know when there are repeated attacks the NG 'is' supposed close down for 20 seconds.

 

This string might cause it:

 

==========

[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Tuesday, March 20, 2018 00:02:18
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Monday, March 19, 2018 23:49:24
[DoS Attack: ACK Scan] from source: 138.118.179.186, port 54995, Monday, March 19, 2018 23:40:09
[DoS Attack: SYN/ACK Scan] from source: 139.99.139.140, port 27025, Monday, March 19, 2018 23:38:10
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 23:36:44
[DoS Attack: ACK Scan] from source: 93.184.215.217, port 443, Monday, March 19, 2018 23:33:46
[DoS Attack: ACK Scan] from source: 40.77.229.46, port 443, Monday, March 19, 2018 23:33:23
[DoS Attack: ACK Scan] from source: 93.184.215.217, port 443, Monday, March 19, 2018 23:33:22
[DoS Attack: ACK Scan] from source: 40.77.229.46, port 443, Monday, March 19, 2018 23:33:21
[DoS Attack: SYN/ACK Scan] from source: 23.1.99.237, port 443, Monday, March 19, 2018 23:32:41
[DoS Attack: ACK Scan] from source: 157.240.14.15, port 443, Monday, March 19, 2018 23:30:30
[DoS Attack: ACK Scan] from source: 157.240.14.19, port 443, Monday, March 19, 2018 23:30:21
[DoS Attack: ACK Scan] from source: 157.240.14.16, port 443, Monday, March 19, 2018 23:30:17
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:30:08
[DoS Attack: ACK Scan] from source: 157.240.14.19, port 443, Monday, March 19, 2018 23:30:00
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:58
[DoS Attack: ACK Scan] from source: 157.240.14.15, port 443, Monday, March 19, 2018 23:29:40
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:37
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 23:29:11

==========

However many of those are from Facebook and Dropbox?

 

Another string:

 

=======
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:57:05
[DoS Attack: ACK Scan] from source: 208.66.239.90, port 443, Monday, March 19, 2018 21:55:59
[DoS Attack: ACK Scan] from source: 208.66.239.90, port 443, Monday, March 19, 2018 21:53:13
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:36:33
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:26:21
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:16:44
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:16:09
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:13:30
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 21:08:18
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 21:06:16
[DoS Attack: RST Scan] from source: 219.92.244.157, port 64706, Monday, March 19, 2018 21:02:50
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:56:13
[DoS Attack: SYN/ACK Scan] from source: 184.175.115.75, port 80, Monday, March 19, 2018 20:50:40
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:46:04
[DoS Attack: ACK Scan] from source: 138.186.76.72, port 5980, Monday, March 19, 2018 20:45:50
[DoS Attack: ACK Scan] from source: 138.118.177.142, port 12949, Monday, March 19, 2018 20:40:19
[DoS Attack: ACK Scan] from source: 138.186.79.194, port 51155, Monday, March 19, 2018 20:37:37
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:25:46
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:15:48
[DoS Attack: ACK Scan] from source: 131.253.34.233, port 443, Monday, March 19, 2018 20:06:11
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Monday, March 19, 2018 20:06:10
[DoS Attack: ACK Scan] from source: 131.253.34.233, port 443, Monday, March 19, 2018 20:06:10
[Time synchronized with NTP server] Monday, March 19, 2018 20:04:30
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:03:30
[DoS Attack: ACK Scan] from source: 144.202.3.29, port 443, Monday, March 19, 2018 20:03:18
[DoS Attack: ACK Scan] from source: 162.125.18.133, port 443, Monday, March 19, 2018 20:03:15

======

 

From Blizzard Entertainment, Asia Pacific Network Information Centre (APNIC), Lacnic, Vultr Holdings, and others.

 

Oddly Port 80 is to reach a web site and Port 443 is the HTTPS:// way to reach it. You running a Web Server? Wonder is your ISP is searching for a web site and finds it and floods it?

 

I could be wrong though.

 

I do see ONE clear Internet drop:

 

=========

[Internet connected] IP address: 73.107.82.57, Monday, March 19, 2018 20:03:07
[Internet disconnected] Monday, March 19, 2018 20:02:57
[admin login] from source 192.168.1.4, Monday, March 19, 2018 20:02:41

=========

 

for 10 seconds, but it might have been done by 'you' as admin by the ALYS-DESKTOP PC. A clear 10 second disconnect of the Internet.

 

For logging, what do you have enabled and what is NOT enabled?

 

I sort of grasping at straws here, hard to tell, some could be normal?

 

What boxes do you have checked on the Advanced, Setup, WAN Setup page?

Message 6 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

For WAN all I have checked is Disable IGMP Proxying. Also, I'm unsure how to check my logging. I apologize. 

But what should I have checkmarked and nor checkmarked?

Message 7 of 10
IrvSp
Master

Re: Ethernet cuts out for a few seconds and is getting worse

WAN tab is good.

 

Logging is covered on page 88 of your manual.

 

Choices for logging are :

 

Include in Log
Attempted access to allowed sites
Attempted access to blocked sites and services
Connections to the Web-based interface of this Router
Router operation (startup, get time etc)
Known DoS attacks and Port Scans
Port Forwarding / Port Triggering
Wireless access
Automatic Internet connection reset
Turn off wireless signal by schedule

 

I'd uncheck the first 3 and Wireless access at the bottom and probably the last one as well.

Message 8 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

So this version of the Nighthawk has been known to cause severe issues? 

Message 9 of 10
SicilianAngel96
Aspirant

Re: Ethernet cuts out for a few seconds and is getting worse

Ok. I'll probably do that. Thank you. Hopefully the next router does not cause any ethernet or internet issues.

Message 10 of 10
Top Contributors
Discussion stats
  • 9 replies
  • 2330 views
  • 0 kudos
  • 2 in conversation
Announcements

Orbi WiFi 6E